Analysis
-
max time kernel
98s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
Resource
win10v2004-20220414-en
General
-
Target
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe
-
Size
2.1MB
-
MD5
9fa5bfb2a6fa702ef279ff02924a2282
-
SHA1
f9f79b47d6dca30b6ed0cc94636b299923e10eda
-
SHA256
08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877
-
SHA512
d796083383e4bddaf7946fb6a8dceeef515e08bb84580138a962a4190facae39f79bd0564f8f9c21674e694105cdcdbc2af79371db2bc8ed2cd43273f7f0af6c
Malware Config
Extracted
oski
hostisgerhg.tk
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe -
resource yara_rule behavioral2/memory/2148-130-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-132-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-131-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-133-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-135-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-136-0x0000000000900000-0x0000000000F30000-memory.dmp themida behavioral2/memory/2148-134-0x0000000000900000-0x0000000000F30000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4148 2148 WerFault.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe"C:\Users\Admin\AppData\Local\Temp\08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 12602⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2148 -ip 21481⤵PID:1736