Analysis
-
max time kernel
17s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-02-2023 06:41
Behavioral task
behavioral1
Sample
9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe
Resource
win10v2004-20221111-en
General
-
Target
9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe
-
Size
200KB
-
MD5
c98eba0c6b6491eaf7a05618cab679b9
-
SHA1
76081bc414d180a6184994d352af946cf9ba631f
-
SHA256
9a4949ef95975afceb281a33708ea8bcd90be831112bb2d89e7e3ba64a3e119a
-
SHA512
40eca72da50a1409ed98d1a4804e2d973d9cc30f0f6cf095c95cbf1b07159cc64caa0446f897ee774e4de01e75b6df3828a3aa00f860506c9d2dc43b18f829b9
-
SSDEEP
3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIU1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pN11Ljo3c
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1324 520 WerFault.exe 20 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 520 wrote to memory of 1324 520 9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe 30 PID 520 wrote to memory of 1324 520 9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe 30 PID 520 wrote to memory of 1324 520 9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe 30 PID 520 wrote to memory of 1324 520 9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe"C:\Users\Admin\AppData\Local\Temp\9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 7722⤵
- Program crash
PID:1324
-