Analysis
-
max time kernel
1848s -
max time network
1853s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-09-2022 16:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
Resource
win10v2004-20220812-en
General
-
Target
https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
Malware Config
Extracted
oski
62.77.159.212
panel.com
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 4 IoCs
pid Process 2608 Oski_Stealer.exe 2764 Oski Cracked.exe 2804 crack.exe 2204 Oski_Cracked_panel.com.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crack.exe crack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crack.exe crack.exe -
Loads dropped DLL 6 IoCs
pid Process 2608 Oski_Stealer.exe 2608 Oski_Stealer.exe 2608 Oski_Stealer.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2776 2204 WerFault.exe 46 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main Oski_Stealer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C3E0091-35E0-11ED-A920-7ADB5DB493F4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 200000001a00eebbfe230000100090e24d373f126545916439c4925e467b00000000 Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Oski Cracked.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = ffffffff Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\NodeSlot = "3" Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Oski Cracked.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Oski Cracked.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache firefox.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Oski Cracked.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 5e003100000000003055058710004f534b495f537e310000460008000400efbe3055fa86305505872a000000993101000000160000000000000000000000000000004f0073006b0069005f0053007400650061006c0065007200000018000000 Oski Cracked.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Oski Cracked.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Oski Cracked.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Oski_Stealer.rar:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 crack.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1036 firefox.exe Token: SeDebugPrivilege 1036 firefox.exe Token: SeDebugPrivilege 1036 firefox.exe Token: SeRestorePrivilege 2456 7zG.exe Token: 35 2456 7zG.exe Token: SeSecurityPrivilege 2456 7zG.exe Token: SeSecurityPrivilege 2456 7zG.exe Token: 33 2540 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2540 AUDIODG.EXE Token: 33 2540 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2540 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1036 firefox.exe 1036 firefox.exe 1036 firefox.exe 1036 firefox.exe 2456 7zG.exe 2904 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1036 firefox.exe 1036 firefox.exe 1036 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1036 firefox.exe 1036 firefox.exe 1036 firefox.exe 2608 Oski_Stealer.exe 2608 Oski_Stealer.exe 2764 Oski Cracked.exe 2904 iexplore.exe 2904 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1064 wrote to memory of 1036 1064 firefox.exe 27 PID 1036 wrote to memory of 1240 1036 firefox.exe 29 PID 1036 wrote to memory of 1240 1036 firefox.exe 29 PID 1036 wrote to memory of 1240 1036 firefox.exe 29 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 2036 1036 firefox.exe 30 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31 PID 1036 wrote to memory of 1096 1036 firefox.exe 31
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.upload.ee/files/14365900/Oski_Stealer.rar.html1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.upload.ee/files/14365900/Oski_Stealer.rar.html2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1036.0.376813773\1441589455" -parentBuildID 20200403170909 -prefsHandle 1180 -prefMapHandle 1172 -prefsLen 1 -prefMapSize 220106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1036 "\\.\pipe\gecko-crash-server-pipe.1036" 1244 gpu3⤵PID:1240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1036.3.999632833\721739798" -childID 1 -isForBrowser -prefsHandle 1824 -prefMapHandle 1724 -prefsLen 122 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1036 "\\.\pipe\gecko-crash-server-pipe.1036" 1556 tab3⤵PID:2036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1036.13.1084036182\2053841369" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2604 -prefsLen 6904 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1036 "\\.\pipe\gecko-crash-server-pipe.1036" 2632 tab3⤵PID:1096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1036.14.125793770\903399857" -childID 3 -isForBrowser -prefsHandle 2640 -prefMapHandle 2620 -prefsLen 6904 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1036 "\\.\pipe\gecko-crash-server-pipe.1036" 2712 tab3⤵PID:840
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Oski_Stealer\" -spe -an -ai#7zMap5402:86:7zEvent111991⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2456
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe"C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\Downloads\Oski_Stealer\crack.exe"C:\Users\Admin\Downloads\Oski_Stealer\crack.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious behavior: AddClipboardFormatListener
PID:2804
-
-
C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe"C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe"1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://t.me/lenskiyteamoff2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
-
C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe"C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe"1⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 6162⤵
- Loads dropped DLL
- Program crash
PID:2776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD58b08722c088f4d3cd86f6febe3009218
SHA16f861205315deeb116e7089bdd6bf9084e5b319a
SHA2565a98eeb8380e97436bd6d1f4a828b2e443e0020df9e8220b28a71e18b0338141
SHA5121188110fe449c68ccd92d206dc19f759fdffe2bbe1f46c43113a23060f84a4a4254b8aa3d0b8afad5a052dfc14df580dd841ef80b850652b82a9feeb4672f08f
-
Filesize
3.9MB
MD52bd0e61c45d352697c5e16437d8055b0
SHA10b9b24d396a50c2dc13d73e1f2d57c1891de3f31
SHA25671efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b
SHA51280044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d
-
Filesize
3.9MB
MD52bd0e61c45d352697c5e16437d8055b0
SHA10b9b24d396a50c2dc13d73e1f2d57c1891de3f31
SHA25671efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b
SHA51280044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d
-
Filesize
200KB
MD56a24d4e31d46c2f602996981fe525fb6
SHA14134cbbdfec13e772a5d4b7af79159248781ef04
SHA256b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770
SHA512338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe
-
Filesize
20.8MB
MD5e805420c064b84ae287b068f14ffb2e8
SHA1bbd5cf53618c2cdf47464d6c688d7baa433747c3
SHA256d727c2ed17780b47f2c8661cf896d434d2a1946a30888245dd1d47e7e7fdcbbf
SHA5120881d0023d54581a723f4523be720b42f8417cc9c0ad057fdc235ed90e246643034471300ec4fd6e5cb8d97d33ce136f9edabab5141f4af23fa27ec4dbd61e33
-
Filesize
20.8MB
MD5e805420c064b84ae287b068f14ffb2e8
SHA1bbd5cf53618c2cdf47464d6c688d7baa433747c3
SHA256d727c2ed17780b47f2c8661cf896d434d2a1946a30888245dd1d47e7e7fdcbbf
SHA5120881d0023d54581a723f4523be720b42f8417cc9c0ad057fdc235ed90e246643034471300ec4fd6e5cb8d97d33ce136f9edabab5141f4af23fa27ec4dbd61e33
-
Filesize
200KB
MD53ac80dee855e85c52c0170373af79a04
SHA179b6a5708b05b88847b605dfe5271073826ba5f4
SHA25652338add561f1e396b0f8377e77bae2a05bcb8d7cc19548dbf9ff8cf0b57cc1f
SHA5120a2eae9404bec953ba84d98c05455b0fd42500c80ab66e8c9ffb19e102a81cb98dd09b82e862dbe15fb142e39165514ff6ac12d6acf47494a73222052923eb3c
-
Filesize
200KB
MD53ac80dee855e85c52c0170373af79a04
SHA179b6a5708b05b88847b605dfe5271073826ba5f4
SHA25652338add561f1e396b0f8377e77bae2a05bcb8d7cc19548dbf9ff8cf0b57cc1f
SHA5120a2eae9404bec953ba84d98c05455b0fd42500c80ab66e8c9ffb19e102a81cb98dd09b82e862dbe15fb142e39165514ff6ac12d6acf47494a73222052923eb3c
-
Filesize
18KB
MD52a62b2d78f2c0f2efd39f07641d231e1
SHA130e17f27edb951a306fd907e37aacc170bf3c7be
SHA256b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a
SHA5124246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5
-
Filesize
18KB
MD52a62b2d78f2c0f2efd39f07641d231e1
SHA130e17f27edb951a306fd907e37aacc170bf3c7be
SHA256b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a
SHA5124246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5
-
Filesize
121B
MD57ade4a739cbd8f44d0ef52a2f1bc6e7b
SHA120753d483e1a84cb248ba2c0fb72d44137d7d73f
SHA256cc7649ed53c65e4851ace414529564fe16801bb2bed4cb15588bfd6b4ac13616
SHA5125850c3d064c9d616854a47b4bd398b76494f1fbe9b356ec5e15879f97dc67970168196ec6b177fa71d15d25d25757a29319cbf9697f3a80461aa62b431d53851
-
Filesize
200KB
MD56a24d4e31d46c2f602996981fe525fb6
SHA14134cbbdfec13e772a5d4b7af79159248781ef04
SHA256b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770
SHA512338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe
-
Filesize
200KB
MD56a24d4e31d46c2f602996981fe525fb6
SHA14134cbbdfec13e772a5d4b7af79159248781ef04
SHA256b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770
SHA512338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe
-
Filesize
200KB
MD56a24d4e31d46c2f602996981fe525fb6
SHA14134cbbdfec13e772a5d4b7af79159248781ef04
SHA256b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770
SHA512338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe
-
Filesize
18KB
MD52a62b2d78f2c0f2efd39f07641d231e1
SHA130e17f27edb951a306fd907e37aacc170bf3c7be
SHA256b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a
SHA5124246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5
-
Filesize
18KB
MD52a62b2d78f2c0f2efd39f07641d231e1
SHA130e17f27edb951a306fd907e37aacc170bf3c7be
SHA256b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a
SHA5124246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5
-
Filesize
18KB
MD52a62b2d78f2c0f2efd39f07641d231e1
SHA130e17f27edb951a306fd907e37aacc170bf3c7be
SHA256b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a
SHA5124246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5