Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-01-2023 11:41
Behavioral task
behavioral1
Sample
c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe
Resource
win10v2004-20221111-en
General
-
Target
c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe
-
Size
200KB
-
MD5
32796b5ab01af3bb6585ac7c2f31402f
-
SHA1
c7456b083fcac2b5995c3a1621c2a508d55154bf
-
SHA256
c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274
-
SHA512
03c2b772084d73bd5532eac1232e18d5b12c4474872d0283a7413ff64f6401b830d91755f050411951efcd3e59520a8b9955d454ea8d3791df535342863b0d6e
-
SSDEEP
3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIf1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNO1Ljo3c
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1632 2028 WerFault.exe 25 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1632 2028 c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe 28 PID 2028 wrote to memory of 1632 2028 c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe 28 PID 2028 wrote to memory of 1632 2028 c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe 28 PID 2028 wrote to memory of 1632 2028 c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe"C:\Users\Admin\AppData\Local\Temp\c86f5effa03017eb59c8b9d6f25359c8a97b36b4d0f782b4749fc3a74cd68274.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10002⤵
- Program crash
PID:1632
-