Analysis

  • max time kernel
    2s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 02:33

General

  • Target

    537dafbf2acf47786823913fcb138634.ps1

  • Size

    656KB

  • MD5

    537dafbf2acf47786823913fcb138634

  • SHA1

    750303a51406a6947f8c5043c9010a0f95590522

  • SHA256

    3a7ddba50c414ef70d1796f1e3eef20b1684811f03a0c400d5388a0079ef4ce5

  • SHA512

    778a88719be802f22facc88dbd0a19a153c5c2e79e043f2db0c4b4bb8995972a37485738763365ccc1815742fc183110f6f6c699532ccbe1034395fe0dfb7006

  • SSDEEP

    12288:EZjw0RJ9u5ILYDxD3fxYehza/tw64c8TVkc5A+:g3gTmr+

Score
10/10

Malware Config

Extracted

Family

oski

C2

/103.114.107.28/l1919/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\537dafbf2acf47786823913fcb138634.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      #cmd
      2⤵
        PID:4200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 1120
          3⤵
          • Program crash
          PID:4760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4200 -ip 4200
      1⤵
        PID:1964

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3292-52-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-50-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-13-0x000002AC5F640000-0x000002AC5F650000-memory.dmp

        Filesize

        64KB

      • memory/3292-11-0x000002AC5F640000-0x000002AC5F650000-memory.dmp

        Filesize

        64KB

      • memory/3292-48-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-14-0x000002AC5F680000-0x000002AC5F6A6000-memory.dmp

        Filesize

        152KB

      • memory/3292-26-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-46-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-54-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-44-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-60-0x00007FFE9C7B0000-0x00007FFE9D271000-memory.dmp

        Filesize

        10.8MB

      • memory/3292-16-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-15-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-18-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-55-0x000002AC5F6A0000-0x000002AC5F6A1000-memory.dmp

        Filesize

        4KB

      • memory/3292-0-0x000002AC5F650000-0x000002AC5F672000-memory.dmp

        Filesize

        136KB

      • memory/3292-10-0x00007FFE9C7B0000-0x00007FFE9D271000-memory.dmp

        Filesize

        10.8MB

      • memory/3292-12-0x000002AC5F640000-0x000002AC5F650000-memory.dmp

        Filesize

        64KB

      • memory/3292-20-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-42-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-40-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-38-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-36-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-34-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-32-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-30-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-28-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-24-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/3292-22-0x000002AC5F680000-0x000002AC5F6A0000-memory.dmp

        Filesize

        128KB

      • memory/4200-56-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4200-59-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4200-62-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4200-61-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4200-65-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB