Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 22:05
Static task
static1
Behavioral task
behavioral1
Sample
7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe
Resource
win10v2004-20220414-en
General
-
Target
7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe
-
Size
502KB
-
MD5
73102502f0e548c16c740cbfeb6ce6c9
-
SHA1
19c33b9d9bbffde348cbf4dcb20005253e020775
-
SHA256
7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c
-
SHA512
2636520d7f6500f3631a60d1f56f74546c84a4a34864fbfb2fcf0a5dd29a6565d5ef6c6b1e31e708f9b3cd4fe566fe3924f0f972372f39411ef691f3886c1863
Malware Config
Extracted
oski
k6vq28tbjbz5rhjsgtm3gmsy.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1964 1832 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1960 wrote to memory of 1832 1960 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 28 PID 1832 wrote to memory of 1964 1832 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 31 PID 1832 wrote to memory of 1964 1832 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 31 PID 1832 wrote to memory of 1964 1832 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 31 PID 1832 wrote to memory of 1964 1832 7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe"C:\Users\Admin\AppData\Local\Temp\7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\7e1fe76f273a5af1221edea44b386e3c2240d80a0577ef6ed8a1db7cb756c45c.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 7603⤵
- Program crash
PID:1964
-
-