IMG_0501_765_013.exe

General
Target

IMG_0501_765_013.exe

Filesize

222KB

Completed

06-05-2021 14:16

Score
10 /10
MD5

716e89179126809cc5a4b476a03dda11

SHA1

29bfe1170a118c56776938fb44289884da261294

SHA256

2976262aeed56001f874b183072c03360a1dbcdde67bfdcc982078d3bc246857

Malware Config

Extracted

Family oski
C2

31.210.21.154

Signatures 5

Filter: none

  • Oski

    Description

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext
    IMG_0501_765_013.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 640 set thread context of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
  • Suspicious behavior: EnumeratesProcesses
    IMG_0501_765_013.exe

    Reported IOCs

    pidprocess
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
    640IMG_0501_765_013.exe
  • Suspicious use of AdjustPrivilegeToken
    IMG_0501_765_013.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege640IMG_0501_765_013.exe
  • Suspicious use of WriteProcessMemory
    IMG_0501_765_013.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 640 wrote to memory of 3828640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 3828640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 3828640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 3296640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 3296640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 3296640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
    PID 640 wrote to memory of 1340640IMG_0501_765_013.exeIMG_0501_765_013.exe
Processes 4
  • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      PID:3828
    • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      PID:3296
    • C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      C:\Users\Admin\AppData\Local\Temp\IMG_0501_765_013.exe
      PID:1340
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/640-114-0x0000000000380000-0x0000000000381000-memory.dmp

                          • memory/640-116-0x0000000005300000-0x0000000005301000-memory.dmp

                          • memory/640-117-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                          • memory/640-118-0x0000000004C80000-0x0000000004C82000-memory.dmp

                          • memory/640-119-0x0000000004E00000-0x0000000004E01000-memory.dmp

                          • memory/640-120-0x0000000004D60000-0x0000000004D61000-memory.dmp

                          • memory/640-121-0x0000000004DB0000-0x0000000004DCF000-memory.dmp

                          • memory/1340-122-0x0000000000400000-0x0000000000438000-memory.dmp

                          • memory/1340-123-0x000000000040717B-mapping.dmp

                          • memory/1340-124-0x0000000000400000-0x0000000000438000-memory.dmp