Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 00:55
Static task
static1
Behavioral task
behavioral1
Sample
3d793ab63dcd431fa16d38ec5ab1f9c7.ps1
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d793ab63dcd431fa16d38ec5ab1f9c7.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3d793ab63dcd431fa16d38ec5ab1f9c7.ps1
-
Size
421KB
-
MD5
3d793ab63dcd431fa16d38ec5ab1f9c7
-
SHA1
74c4de4e37b5ffa5f7845541efad58c64c566928
-
SHA256
8aab64d02092bea3f4a51f06b243b41c80492c92b3b83997c7e498fd69e10506
-
SHA512
5db3733da6a7e60c3f3cc8c20902aaf04a449e82eb9920aa7c0462fc3741390778ad1b0f8eae0f7c65b6967bffc6cb68b2e34811627f61023f8690470eeafa30
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64fL68:q3w
Score
10/10
Malware Config
Extracted
Family
oski
C2
/103.114.107.28/l25/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 1892 1900 powershell.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2756 1892 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1900 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1900 wrote to memory of 1892 1900 powershell.exe 29 PID 1892 wrote to memory of 2756 1892 MSBuild.exe 30 PID 1892 wrote to memory of 2756 1892 MSBuild.exe 30 PID 1892 wrote to memory of 2756 1892 MSBuild.exe 30 PID 1892 wrote to memory of 2756 1892 MSBuild.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3d793ab63dcd431fa16d38ec5ab1f9c7.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 1123⤵
- Program crash
PID:2756
-
-