Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
Resource
win10v2004-20220414-en
General
-
Target
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
-
Size
2.1MB
-
MD5
9fa5bfb2a6fa702ef279ff02924a2282
-
SHA1
f9f79b47d6dca30b6ed0cc94636b299923e10eda
-
SHA256
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877
-
SHA512
d796083383e4bddaf7946fb6a8dceeef515e08bb84580138a962a4190facae39f79bd0564f8f9c21674e694105cdcdbc2af79371db2bc8ed2cd43273f7f0af6c
Malware Config
Extracted
oski
hostisgerhg.tk
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1980-55-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-56-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-57-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-58-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-59-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-60-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-61-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-62-0x0000000001200000-0x0000000001830000-memory.dmp themida behavioral1/memory/1980-63-0x0000000001200000-0x0000000001830000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 432 1980 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 432 1980 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe 30 PID 1980 wrote to memory of 432 1980 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe 30 PID 1980 wrote to memory of 432 1980 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe 30 PID 1980 wrote to memory of 432 1980 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe"C:\Users\Admin\AppData\Local\Temp\08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 7642⤵
- Program crash
PID:432
-