Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 12:35
Static task
static1
Behavioral task
behavioral1
Sample
b3344d57c132a4ea95c92fd21c597590.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b3344d57c132a4ea95c92fd21c597590.exe
Resource
win10v2004-20231215-en
General
-
Target
b3344d57c132a4ea95c92fd21c597590.exe
-
Size
441KB
-
MD5
b3344d57c132a4ea95c92fd21c597590
-
SHA1
26f255504c86d3ee652c88450ac8ef9d49651d11
-
SHA256
b5a1a2fbb4786f68248ba11b8780b8c8294ed881fed3c362c54b0560e1cb2018
-
SHA512
483b50f0b49555065e2b395246567f2f8a925ed13df43dd96438aac4a6aacae37ab25af61ce85d21de3d9e9ff23ef24f37eccae69d377a2ad5ae44a4acedf370
-
SSDEEP
12288:EAodPtkt4pss2IBgWbtAZPSNvg4JQLIGcmq9W:EAgVziIBgW5Ax2g4+7cv8
Malware Config
Extracted
oski
robbmaterials.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation b3344d57c132a4ea95c92fd21c597590.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3316 set thread context of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2464 3152 WerFault.exe 95 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4704 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4704 3316 b3344d57c132a4ea95c92fd21c597590.exe 93 PID 3316 wrote to memory of 4704 3316 b3344d57c132a4ea95c92fd21c597590.exe 93 PID 3316 wrote to memory of 4704 3316 b3344d57c132a4ea95c92fd21c597590.exe 93 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95 PID 3316 wrote to memory of 3152 3316 b3344d57c132a4ea95c92fd21c597590.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3344d57c132a4ea95c92fd21c597590.exe"C:\Users\Admin\AppData\Local\Temp\b3344d57c132a4ea95c92fd21c597590.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YajFFkFQFAik" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF6E.tmp"2⤵
- Creates scheduled task(s)
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\b3344d57c132a4ea95c92fd21c597590.exe"C:\Users\Admin\AppData\Local\Temp\b3344d57c132a4ea95c92fd21c597590.exe"2⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 13003⤵
- Program crash
PID:2464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3152 -ip 31521⤵PID:532