Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    06-05-2021 14:14

General

  • Target

    IMG_0501_765_013.exe

  • Size

    222KB

  • MD5

    716e89179126809cc5a4b476a03dda11

  • SHA1

    29bfe1170a118c56776938fb44289884da261294

  • SHA256

    2976262aeed56001f874b183072c03360a1dbcdde67bfdcc982078d3bc246857

  • SHA512

    fbecf0cdd2bb9df647034bc16d0c6b9749406c30a10e4fa19305b592f066670af80137923c56ef2f9c12b3cc44a2eb99e1b1f9913ebc37abb775b6fd15e27e22

Score
10/10

Malware Config

Extracted

Family

oski

C2

31.210.21.154

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      2⤵
        PID:3828
      • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
        C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
        2⤵
          PID:3296
        • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
          C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
          2⤵
            PID:1340

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/640-114-0x0000000000380000-0x0000000000381000-memory.dmp

          Filesize

          4KB

        • memory/640-116-0x0000000005300000-0x0000000005301000-memory.dmp

          Filesize

          4KB

        • memory/640-117-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

          Filesize

          4KB

        • memory/640-118-0x0000000004C80000-0x0000000004C82000-memory.dmp

          Filesize

          8KB

        • memory/640-119-0x0000000004E00000-0x0000000004E01000-memory.dmp

          Filesize

          4KB

        • memory/640-120-0x0000000004D60000-0x0000000004D61000-memory.dmp

          Filesize

          4KB

        • memory/640-121-0x0000000004DB0000-0x0000000004DCF000-memory.dmp

          Filesize

          124KB

        • memory/1340-122-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1340-123-0x000000000040717B-mapping.dmp

        • memory/1340-124-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB