Analysis
-
max time kernel
0s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
c2d2ff688f1345c9c2eb58e8b1d5a5d2.ps1
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c2d2ff688f1345c9c2eb58e8b1d5a5d2.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
c2d2ff688f1345c9c2eb58e8b1d5a5d2.ps1
-
Size
656KB
-
MD5
c2d2ff688f1345c9c2eb58e8b1d5a5d2
-
SHA1
2d25e05272ea1ec9265f183c137b68d66f3981af
-
SHA256
243fcf79293c9109eee9cee3077060272b9f5e3adfabd2dbd1323e2ffd58b1df
-
SHA512
bb3464dfde478d0db1ace6d74a98610a18b036bc8eef1e2ee6c814ebb4cc3ff7fa4825dc7f464f6147ce06073e40fb4f3110e3522774c7ba52b9507622c0624b
-
SSDEEP
12288:EZjw0RJ9u5ILYDxD3fxYehza/tw64s8TVkc5A+:g3gTmr+
Score
10/10
Malware Config
Extracted
Family
oski
C2
103.114.107.28/l9/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4556 powershell.exe 4556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4556 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c2d2ff688f1345c9c2eb58e8b1d5a5d2.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵PID:696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵PID:4652
-