Analysis

  • max time kernel
    141s
  • max time network
    224s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2023 22:04

General

  • Target

    0d09fe43e5f18cd6c7a38cda8fd9f2e6.ps1

  • Size

    485KB

  • MD5

    0d09fe43e5f18cd6c7a38cda8fd9f2e6

  • SHA1

    07baad37ee15907d9143da04abd96ee042953fc4

  • SHA256

    c01d01039b836da6585e437ff3cec6dc4a0a45b362352028b48c4ff3f0ad22c8

  • SHA512

    d36b73726d0cab82d4f35b0701b6a372b7999be85fe29b6e9223c48df11937b75ff74a0e159d9df22b9699bdcca6a69cd258f782375a8578852efedcb035d062

  • SSDEEP

    12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64yigu:q3bu

Score
10/10

Malware Config

Extracted

Family

oski

C2

103.114.107.28/l7/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0d09fe43e5f18cd6c7a38cda8fd9f2e6.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      #cmd
      2⤵
        PID:2508

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1xdcvruc.j20.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2508-14-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2508-15-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2508-16-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2508-19-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2508-21-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2600-9-0x000002497BD50000-0x000002497BD72000-memory.dmp

      Filesize

      136KB

    • memory/2600-10-0x00007FFCF1570000-0x00007FFCF2031000-memory.dmp

      Filesize

      10.8MB

    • memory/2600-12-0x000002497BE00000-0x000002497BE10000-memory.dmp

      Filesize

      64KB

    • memory/2600-11-0x000002497BE00000-0x000002497BE10000-memory.dmp

      Filesize

      64KB

    • memory/2600-13-0x000002497BDC0000-0x000002497BDD2000-memory.dmp

      Filesize

      72KB

    • memory/2600-20-0x00007FFCF1570000-0x00007FFCF2031000-memory.dmp

      Filesize

      10.8MB