Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2023 11:04
Behavioral task
behavioral1
Sample
90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe
Resource
win7-20230220-en
General
-
Target
90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe
-
Size
432KB
-
MD5
566e00ed92162e1941567623e9938067
-
SHA1
3e285319ece4b35b877dd60a920d8970d87ed3fd
-
SHA256
90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2
-
SHA512
7d96e0aea8302506713613ed68a55cea2ec0f1e4cd64ba6ff424bd772c621a6ad9136da2ec9c1f80b41c4267f7bd2ace82923f2ae2221010568f1e5de63fceaa
-
SSDEEP
6144:K2nLfyfKQu8zZ0zQ7Cn7ggrw5vK/cKomvWzMlTRay9VAHPpczK3qKTmZrqBMdGGF:K2nLYpzZUMKNHompdBwcKJurqBpJXAAu
Malware Config
Extracted
oski
Fragly.top
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ os.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion os.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion os.exe -
Executes dropped EXE 2 IoCs
pid Process 1608 winrar-x64.exe.exe 412 os.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000001e47f-164.dat themida behavioral2/files/0x000200000001e47f-165.dat themida behavioral2/memory/412-167-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-168-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-169-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-172-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-173-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-174-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-175-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-176-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-177-0x0000000000B90000-0x0000000001023000-memory.dmp themida behavioral2/memory/412-180-0x0000000000B90000-0x0000000001023000-memory.dmp themida -
resource yara_rule behavioral2/memory/772-133-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/772-138-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/772-166-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/772-170-0x0000000000400000-0x00000000004FF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA os.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 412 os.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2628 412 WerFault.exe 91 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1608 winrar-x64.exe.exe 1608 winrar-x64.exe.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 772 wrote to memory of 1608 772 90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe 89 PID 772 wrote to memory of 1608 772 90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe 89 PID 772 wrote to memory of 412 772 90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe 91 PID 772 wrote to memory of 412 772 90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe 91 PID 772 wrote to memory of 412 772 90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe"C:\Users\Admin\AppData\Local\Temp\90cfb42d8415b2804d7335d4e9ddda33264906b0169dd121ccc80bd50643d0e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\winrar-x64.exe.exeC:\Users\Admin\AppData\Roaming\winrar-x64.exe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Users\Admin\AppData\Roaming\os.exeC:\Users\Admin\AppData\Roaming\os.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 13403⤵
- Program crash
PID:2628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 412 -ip 4121⤵PID:3188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5b12b4cb2ca643b0b00ce042da30ea040
SHA168fa56f7a4f250e8cf140aeb9639141874e5203a
SHA2568455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d
SHA512efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a
-
Filesize
4.3MB
MD5b12b4cb2ca643b0b00ce042da30ea040
SHA168fa56f7a4f250e8cf140aeb9639141874e5203a
SHA2568455d1d048cc087c33fc366aed0cd25d385ef33e5f5833c199ed9f390eb9238d
SHA512efa44431a80c5a70c52a9b659a1f752a80f4ed71d93ea9a7a89e9b0cd7976f1fa7fa7bd71704901d60e885be6a6087af42eef49ff1b7a515a204de7d6951727a
-
Filesize
3.1MB
MD561c12d7edaa1c467c8b2bdc028936da3
SHA18c12f3f143d71e9c07abdf54429992f059ae0bb0
SHA256851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57
SHA512f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a
-
Filesize
3.1MB
MD561c12d7edaa1c467c8b2bdc028936da3
SHA18c12f3f143d71e9c07abdf54429992f059ae0bb0
SHA256851e6ca4857a54b6481668d84438ef4209ebfad89b930b4e30898180728f5f57
SHA512f3117767a2ae1aec191c07e9d3ded0b28aeebc44b0f31d34eb7d1dbe175e9492cc3354b9f87a8419348cc589b7983ae425d574bddf19e0ca0b78487d9891393a