Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-03-2023 00:26
Behavioral task
behavioral1
Sample
315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe
Resource
win10v2004-20230220-en
General
-
Target
315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe
-
Size
200KB
-
MD5
d3287d935adf25f31d05f9b9e949e3e6
-
SHA1
fd37221e82f5cc8ecba3eb1767e6ae1f29cee8db
-
SHA256
315c52da5e4e63b6f1fe534bb94c092ca45280408854c23abbf23697ddd2e406
-
SHA512
125fc90510ded9092bfc4d3bee466ad17e2d78f49cbe1cd5a32b6947ad870432e856a0a461ca53a6088a1844055636b0de91fabce8fe2c0088c9be91cba82f94
-
SSDEEP
3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIg1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNJ1Ljo3c
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1524 1716 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1524 1716 315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe 29 PID 1716 wrote to memory of 1524 1716 315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe 29 PID 1716 wrote to memory of 1524 1716 315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe 29 PID 1716 wrote to memory of 1524 1716 315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe"C:\Users\Admin\AppData\Local\Temp\315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 7482⤵
- Program crash
PID:1524
-