Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:22
Static task
static1
Behavioral task
behavioral1
Sample
a0d1d10ce1be5360824104bafd7eb255.ps1
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a0d1d10ce1be5360824104bafd7eb255.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
a0d1d10ce1be5360824104bafd7eb255.ps1
-
Size
421KB
-
MD5
a0d1d10ce1be5360824104bafd7eb255
-
SHA1
a5d7ebda7760537e92279c807163b7835ab789e4
-
SHA256
35c7adde806daa386ef0e07fcde131bea44ccc9c7e8a03af0a80ed7385cb125f
-
SHA512
5c49df98788c7b5e2194330b98bdf3bc7d3567c6291f4356c39a3e57668d0d478cc6bf322d37bef5413fd90f80b788a7c1539fcb847d9187e345797c5dbc5c9d
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64qL68:q3B
Score
10/10
Malware Config
Extracted
Family
oski
C2
/103.114.107.28/l39/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3032 set thread context of 2716 3032 powershell.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 2716 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 3032 wrote to memory of 2716 3032 powershell.exe 29 PID 2716 wrote to memory of 2964 2716 MSBuild.exe 30 PID 2716 wrote to memory of 2964 2716 MSBuild.exe 30 PID 2716 wrote to memory of 2964 2716 MSBuild.exe 30 PID 2716 wrote to memory of 2964 2716 MSBuild.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a0d1d10ce1be5360824104bafd7eb255.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 4963⤵
- Program crash
PID:2964
-
-