Analysis
-
max time kernel
104s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 21:52
Static task
static1
Behavioral task
behavioral1
Sample
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe
Resource
win10v2004-20220414-en
General
-
Target
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe
-
Size
1.2MB
-
MD5
61bca80732c3e682e00fb4bd8c48d52b
-
SHA1
f32a21133c750d1c26e412b305b32110d281a981
-
SHA256
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f
-
SHA512
498efd615df973793d222bf55573499199b6c1d775b58a0c0c6eb2b94eb8234f6c263156c651e5084eede2bf6d0589500fc375c16728d32ef324be4eb354bca1
Malware Config
Extracted
oski
ibroot.com
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exedescription pid process target process PID 4064 set thread context of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1016 4444 WerFault.exe bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exepid process 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exedescription pid process Token: SeDebugPrivilege 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exedescription pid process target process PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe PID 4064 wrote to memory of 4444 4064 0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe bitsadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe"C:\Users\Admin\AppData\Local\Temp\0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\SysWOW64\bitsadmin.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 12723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4444 -ip 44441⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4064-130-0x0000000000C30000-0x0000000000D60000-memory.dmpFilesize
1.2MB
-
memory/4064-131-0x0000000005690000-0x000000000572C000-memory.dmpFilesize
624KB
-
memory/4444-132-0x0000000000000000-mapping.dmp
-
memory/4444-133-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/4444-134-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/4444-135-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/4444-136-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/4444-137-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB