Analysis

  • max time kernel
    227s
  • max time network
    278s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2023 11:04

General

  • Target

    90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe

  • Size

    432KB

  • MD5

    566e00ed92162e1941567623e9938067

  • SHA1

    3e285319ece4b35b877dd60a920d8970d87ed3fd

  • SHA256

    90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2

  • SHA512

    7d96e0aea8302506713613ed68a55cea2ec0f1e4cd64ba6ff424bd772c621a6ad9136da2ec9c1f80b41c4267f7bd2ace82923f2ae2221010568f1e5de63fceaa

  • SSDEEP

    6144:K2nLfyfKQu8zZ0zQ7Cn7ggrw5vK/cKomvWzMlTRay9VAHPpczK3qKTmZrqBMdGGF:K2nLYpzZUMKNHompdBwcKJurqBpJXAAu

Malware Config

Extracted

Family

oski

C2

Fragly.top

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe
    "C:\Users\Admin\AppData\Local\Temp\90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Roaming\winrar-x64.exe.exe
      C:\Users\Admin\AppData\Roaming\winrar-x64.exe.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:776
    • C:\Users\Admin\AppData\Roaming\os.exe
      C:\Users\Admin\AppData\Roaming\os.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 780
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    beeeb85acc0cf296755e278c4277f4ef

    SHA1

    20a5657fe2798e964aba00da07a82ae99aa5c0c4

    SHA256

    a78f65ef609526312981f2faf1fe336953cbd4dc2668bb2b2959ec1c9fdf01be

    SHA512

    5193900eaba0b55858b4e70b1ecf93268acf735e7fd5cd50cc4c02c4c73b967a2ac6abdd41fa60ea17c9e1db08f735e4c36bc185a495152b4c917cbe3143399f

  • C:\Users\Admin\AppData\Local\Temp\Cab822E.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar83E9.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • C:\Users\Admin\AppData\Roaming\winrar-x64.exe.exe
    Filesize

    3.1MB

    MD5

    61c12d7edaa1c467c8b2bdc028936da3

    SHA1

    8c12f3f143d71e9c07abdf54429992f059ae0bb0

    SHA256

    851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57

    SHA512

    f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a

  • C:\Users\Admin\AppData\Roaming\winrar-x64.exe.exe
    Filesize

    3.1MB

    MD5

    61c12d7edaa1c467c8b2bdc028936da3

    SHA1

    8c12f3f143d71e9c07abdf54429992f059ae0bb0

    SHA256

    851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57

    SHA512

    f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\os.exe
    Filesize

    4.3MB

    MD5

    b12b4cb2ca643b0b00ce042da30ea040

    SHA1

    68fa56f7a4f250e8cf140aeb9639141874e5203a

    SHA256

    8455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d

    SHA512

    efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a

  • \Users\Admin\AppData\Roaming\winrar-x64.exe.exe
    Filesize

    3.1MB

    MD5

    61c12d7edaa1c467c8b2bdc028936da3

    SHA1

    8c12f3f143d71e9c07abdf54429992f059ae0bb0

    SHA256

    851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57

    SHA512

    f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a

  • \Users\Admin\AppData\Roaming\winrar-x64.exe.exe
    Filesize

    3.1MB

    MD5

    61c12d7edaa1c467c8b2bdc028936da3

    SHA1

    8c12f3f143d71e9c07abdf54429992f059ae0bb0

    SHA256

    851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57

    SHA512

    f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a

  • memory/1968-202-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/1968-54-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/1968-224-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/1968-222-0x0000000006D40000-0x00000000071D3000-memory.dmp
    Filesize

    4.6MB

  • memory/1968-211-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/1968-208-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/1968-206-0x0000000000400000-0x00000000004FF000-memory.dmp
    Filesize

    1020KB

  • memory/2016-223-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-231-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-230-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-232-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-233-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-235-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-245-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-229-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-228-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-227-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-226-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-225-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB

  • memory/2016-252-0x0000000000AD0000-0x0000000000F63000-memory.dmp
    Filesize

    4.6MB