Malware Analysis Report

2025-01-03 04:56

Sample ID 220327-capq3sgcbj
Target b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3
SHA256 b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3
Tags
oski infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3

Threat Level: Known bad

The file b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3 was found to be: Known bad.

Malicious Activity Summary

oski infostealer spyware stealer

Oski

Reads user/profile data of web browsers

Program crash

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-03-27 01:52

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-27 01:52

Reported

2022-04-03 12:11

Platform

win7-20220331-en

Max time kernel

50s

Max time network

71s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe

"C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 756

Network

Country Destination Domain Proto
US 8.8.8.8:53 65ao5xzu.com udp

Files

memory/1720-54-0x0000000075341000-0x0000000075343000-memory.dmp

memory/1140-55-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-27 01:52

Reported

2022-04-03 12:11

Platform

win10v2004-20220331-en

Max time kernel

125s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe"

Signatures

Oski

infostealer oski

Reads user/profile data of web browsers

spyware stealer

Processes

C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe

"C:\Users\Admin\AppData\Local\Temp\b60fd92445b6fdc27ef2f0c4df218cca586549ab8bb40942428bc9126c53d5d3.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4772 -ip 4772

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1364

Network

Country Destination Domain Proto
NL 20.190.160.74:443 tcp
US 209.197.3.8:80 tcp
NL 20.190.160.3:443 tcp
US 8.8.8.8:53 65ao5xzu.com udp
US 20.189.173.13:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 204.79.197.203:80 tcp

Files

N/A