Analysis
-
max time kernel
223s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 23:56
Behavioral task
behavioral1
Sample
41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe
Resource
win10v2004-20220901-en
General
-
Target
41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe
-
Size
200KB
-
MD5
d0f80611b76764282e5615af48601d6d
-
SHA1
87b520ee21626677db6d92cf26bd10131e8c7ac5
-
SHA256
41052d6a6b62bda012dbfd2c47b00943bfe395745917e3bc187fcd07870c3bc0
-
SHA512
f30598b75baab9e241979070c10f86a1c43329f1bc033f37f04a45d4825f828a2b35b73f74962f3965cd8491520c8cd21b54752dd94b0ff93b3f652e43ce7ece
-
SSDEEP
3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIE1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNx1Ljo3c
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1436 564 WerFault.exe 15 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 564 wrote to memory of 1436 564 41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe 30 PID 564 wrote to memory of 1436 564 41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe 30 PID 564 wrote to memory of 1436 564 41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe 30 PID 564 wrote to memory of 1436 564 41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe"C:\Users\Admin\AppData\Local\Temp\41052D6A6B62BDA012DBFD2C47B00943BFE395745917E.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 4442⤵
- Program crash
PID:1436
-