Analysis

  • max time kernel
    17s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2023 06:41

General

  • Target

    9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe

  • Size

    200KB

  • MD5

    c98eba0c6b6491eaf7a05618cab679b9

  • SHA1

    76081bc414d180a6184994d352af946cf9ba631f

  • SHA256

    9a4949ef95975afceb281a33708ea8bcd90be831112bb2d89e7e3ba64a3e119a

  • SHA512

    40eca72da50a1409ed98d1a4804e2d973d9cc30f0f6cf095c95cbf1b07159cc64caa0446f897ee774e4de01e75b6df3828a3aa00f860506c9d2dc43b18f829b9

  • SSDEEP

    3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIU1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pN11Ljo3c

Malware Config

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe
    "C:\Users\Admin\AppData\Local\Temp\9A4949EF95975AFCEB281A33708EA8BCD90BE831112BB.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 772
      2⤵
      • Program crash
      PID:1324

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/520-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
    Filesize

    8KB

  • memory/1324-55-0x0000000000000000-mapping.dmp