Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
0eab3ccc18c952cc89f73ba1a480070f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0eab3ccc18c952cc89f73ba1a480070f.exe
Resource
win10v2004-20231222-en
General
-
Target
0eab3ccc18c952cc89f73ba1a480070f.exe
-
Size
1.3MB
-
MD5
0eab3ccc18c952cc89f73ba1a480070f
-
SHA1
475b8039046cc7283ee3495aa8abc879679a860b
-
SHA256
c254079e9a75cb708e28deb9c72c77689c53425f8256338343c06285bed8ebbe
-
SHA512
0e7560b4b0de29541944de249cf6dce10d6f51d858e45362e9bb86cc8abe00fcf9fce8a76c660f938313f467ea38defc97f881ec4a9ce56924c78e3af9f71ec5
-
SSDEEP
24576:v2X1TrFY8blhBPHKFOoOxlVkqF2gZROak1FsGrQxQn9Y:OXpyQ1vxzxlPI6RE/Drh9
Malware Config
Extracted
oski
vtgtradings.com
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 0eab3ccc18c952cc89f73ba1a480070f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4920 set thread context of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3096 2384 WerFault.exe 100 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4920 wrote to memory of 2888 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 98 PID 4920 wrote to memory of 2888 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 98 PID 4920 wrote to memory of 2888 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 98 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100 PID 4920 wrote to memory of 2384 4920 0eab3ccc18c952cc89f73ba1a480070f.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eab3ccc18c952cc89f73ba1a480070f.exe"C:\Users\Admin\AppData\Local\Temp\0eab3ccc18c952cc89f73ba1a480070f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OhlPJGhIQFna" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF06B.tmp"2⤵
- Creates scheduled task(s)
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\0eab3ccc18c952cc89f73ba1a480070f.exe"C:\Users\Admin\AppData\Local\Temp\0eab3ccc18c952cc89f73ba1a480070f.exe"2⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 12963⤵
- Program crash
PID:3096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2384 -ip 23841⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD593a217bc2084606fd2517acdbc5c5116
SHA1899e702f452ad4443c8f1984d411d1fcc69a2c58
SHA256ba1925955dca7057bc6748cef22083c6b979647c645a0e3d25b2d1881517284b
SHA512ec4160d69ba4b058d5644f023a5b718799d5ec41b7ccc404bb6dd5b87ed519df36fcaf7f470d066c5da207a5b411539c43e10cfdd1a84534be1a4ee820fbab37