Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 20:37
Static task
static1
Behavioral task
behavioral1
Sample
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe
Resource
win10v2004-20220414-en
General
-
Target
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe
-
Size
491KB
-
MD5
6800f4c8b2d1326dab120a6ad2b99ff6
-
SHA1
d45ad1d4567dd41b9676885c1d7c5e5ef8fe5fc0
-
SHA256
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56
-
SHA512
7bc232c8e430b21a962bc37e094df0a0400a04353f3f776dd851b4c8141caf949076c7537ad995cef536df768225103bb88cb437a9cd14f9218a2572c3f6a54b
Malware Config
Extracted
oski
a343345.me
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1352 svchost.exe -
Loads dropped DLL 6 IoCs
Processes:
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exeWerFault.exepid process 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exedescription pid process target process PID 988 set thread context of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1156 1352 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exesvchost.exedescription pid process target process PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 988 wrote to memory of 1352 988 403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe svchost.exe PID 1352 wrote to memory of 1156 1352 svchost.exe WerFault.exe PID 1352 wrote to memory of 1156 1352 svchost.exe WerFault.exe PID 1352 wrote to memory of 1156 1352 svchost.exe WerFault.exe PID 1352 wrote to memory of 1156 1352 svchost.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe"C:\Users\Admin\AppData\Local\Temp\403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 7843⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
memory/988-71-0x00000000741E0000-0x000000007478B000-memory.dmpFilesize
5.7MB
-
memory/988-54-0x0000000075C71000-0x0000000075C73000-memory.dmpFilesize
8KB
-
memory/1156-73-0x0000000000000000-mapping.dmp
-
memory/1352-66-0x000000000040717B-mapping.dmp
-
memory/1352-69-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-72-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-65-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-63-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-61-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-59-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-57-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1352-56-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB