Analysis
-
max time kernel
154s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 03:36
Static task
static1
Behavioral task
behavioral1
Sample
c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe
-
Size
1.2MB
-
MD5
a1ff7975810b6a9bf046f6a4782bc934
-
SHA1
e60b9301d29f640f8eb671d97fd63e2eb3298eca
-
SHA256
c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc
-
SHA512
a9be74ada359a353eaa0d73529abb7d9db564b93e165f2f9bce7ab5e52d09a2a3a515860f6c950a71d86d5616c1e6f69ca3d00d155ce68e90777e9c91662be7b
Score
10/10
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62 PID 5056 wrote to memory of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62 PID 5056 wrote to memory of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62 PID 5056 wrote to memory of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62 PID 5056 wrote to memory of 3696 5056 c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe"C:\Users\Admin\AppData\Local\Temp\c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe"C:\Users\Admin\AppData\Local\Temp\c5c067473ed4bdd85dcd133a73a5423971d2f8da5c63490ec0a8b774d7b341fc.exe"2⤵PID:3696
-