Analysis
-
max time kernel
9s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe
Resource
win7-20220414-en
General
-
Target
7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe
-
Size
4.0MB
-
MD5
65427e7187928692149566d3e5f827c7
-
SHA1
8840fdda0b074711aa60292d15f9f124604bb009
-
SHA256
7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9
-
SHA512
1e3b92ad2fbb32101bc1a445539a2bcc0aa3d64bc2dcbb2762e2e50da24d190de1b159bf4488235e3a42c3b9e90782eeef53f5d20c4f09e3fce6d79b1728f886
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1304-55-0x00000000010B0000-0x0000000001623000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1304 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 948 1304 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 948 1304 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe 30 PID 1304 wrote to memory of 948 1304 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe 30 PID 1304 wrote to memory of 948 1304 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe 30 PID 1304 wrote to memory of 948 1304 7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe"C:\Users\Admin\AppData\Local\Temp\7ca12ad826ec9ff894b0e854f364a669433badbc130a155667e08d14572498a9.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 8562⤵
- Program crash
PID:948
-