Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:21
Static task
static1
Behavioral task
behavioral1
Sample
134a8e6481ac306a18cf1b20baaf8289.ps1
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
134a8e6481ac306a18cf1b20baaf8289.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
134a8e6481ac306a18cf1b20baaf8289.ps1
-
Size
421KB
-
MD5
134a8e6481ac306a18cf1b20baaf8289
-
SHA1
5653dd3516e2d4dec7b3c711ebe0e1ada51dc930
-
SHA256
2476e53d066a717d8627e08d13e7d2983e6ba9ecd76a8c3968273845f7996bde
-
SHA512
4ad91e37428da130a6d0766e66f590550088d6757ac7e13266b1c38fbc1e5b1f4ba8e1225db26af98cb119ccdeb56c882291ab628eb6560ebce8f62ed66bc5bf
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64BL68:q3W
Score
10/10
Malware Config
Extracted
Family
oski
C2
/103.114.107.28/l32/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2960 2288 powershell.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2940 2960 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2288 powershell.exe 2288 powershell.exe 2288 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2412 2288 powershell.exe 29 PID 2288 wrote to memory of 2412 2288 powershell.exe 29 PID 2288 wrote to memory of 2412 2288 powershell.exe 29 PID 2288 wrote to memory of 2412 2288 powershell.exe 29 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2288 wrote to memory of 2960 2288 powershell.exe 30 PID 2960 wrote to memory of 2940 2960 MSBuild.exe 31 PID 2960 wrote to memory of 2940 2960 MSBuild.exe 31 PID 2960 wrote to memory of 2940 2960 MSBuild.exe 31 PID 2960 wrote to memory of 2940 2960 MSBuild.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\134a8e6481ac306a18cf1b20baaf8289.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 5043⤵
- Program crash
PID:2940
-
-