Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2023 00:26

General

  • Target

    315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe

  • Size

    200KB

  • MD5

    d3287d935adf25f31d05f9b9e949e3e6

  • SHA1

    fd37221e82f5cc8ecba3eb1767e6ae1f29cee8db

  • SHA256

    315c52da5e4e63b6f1fe534bb94c092ca45280408854c23abbf23697ddd2e406

  • SHA512

    125fc90510ded9092bfc4d3bee466ad17e2d78f49cbe1cd5a32b6947ad870432e856a0a461ca53a6088a1844055636b0de91fabce8fe2c0088c9be91cba82f94

  • SSDEEP

    3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIg1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNJ1Ljo3c

Malware Config

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe
    "C:\Users\Admin\AppData\Local\Temp\315C52DA5E4E63B6F1FE534BB94C092CA45280408854C.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 740
      2⤵
      • Program crash
      PID:828

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads