Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 03:01
Static task
static1
Behavioral task
behavioral1
Sample
a2c723046a2c17a707b9637692fffb71.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a2c723046a2c17a707b9637692fffb71.exe
Resource
win10v2004-20220718-en
General
-
Target
a2c723046a2c17a707b9637692fffb71.exe
-
Size
879KB
-
MD5
a2c723046a2c17a707b9637692fffb71
-
SHA1
a6f9221de5a668581363fa8169bb7b1c138e33cb
-
SHA256
fae525089f850763e561a756f8378667c9ed081493ba9871847c83e0013a292d
-
SHA512
20caec409291ec011fb6b62101031ec05eb1a4f57486753ba406dcefb8ec6a32e5655e1d95cc48a27317a18627fbf5fd8fbc22daa2d61923444c3041c11b825a
Malware Config
Extracted
oski
masterwork.me
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1956 a2c723046a2c17a707b9637692fffb71.exe 1256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1956 a2c723046a2c17a707b9637692fffb71.exe Token: SeDebugPrivilege 1256 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1256 1956 a2c723046a2c17a707b9637692fffb71.exe 28 PID 1956 wrote to memory of 1256 1956 a2c723046a2c17a707b9637692fffb71.exe 28 PID 1956 wrote to memory of 1256 1956 a2c723046a2c17a707b9637692fffb71.exe 28 PID 1956 wrote to memory of 1256 1956 a2c723046a2c17a707b9637692fffb71.exe 28 PID 1956 wrote to memory of 2028 1956 a2c723046a2c17a707b9637692fffb71.exe 30 PID 1956 wrote to memory of 2028 1956 a2c723046a2c17a707b9637692fffb71.exe 30 PID 1956 wrote to memory of 2028 1956 a2c723046a2c17a707b9637692fffb71.exe 30 PID 1956 wrote to memory of 2028 1956 a2c723046a2c17a707b9637692fffb71.exe 30 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32 PID 1956 wrote to memory of 1304 1956 a2c723046a2c17a707b9637692fffb71.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c723046a2c17a707b9637692fffb71.exe"C:\Users\Admin\AppData\Local\Temp\a2c723046a2c17a707b9637692fffb71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UFpvpuHQeW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UFpvpuHQeW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC717.tmp"2⤵
- Creates scheduled task(s)
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\a2c723046a2c17a707b9637692fffb71.exe"C:\Users\Admin\AppData\Local\Temp\a2c723046a2c17a707b9637692fffb71.exe"2⤵PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef2c2c7cd39906f54cf8ae4092587259
SHA1b7e417690b7a2bccade36ebcfe50627673134737
SHA256168233e4cfdc385494226f668438ba68a99f448eb2b5ed7c8afb952ef94ac69c
SHA512d3a8306e9b805d29f8236a165200a03c1455c3b7a079e399c42b413a6c52b14c1cf43a952f4a8028889d67a94c823c59570934f8a6096a2180f8ae95f0b16537