Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:08
Static task
static1
Behavioral task
behavioral1
Sample
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
23f2e867ddbbe2e6c9e7959bae0df84e.ps1
-
Size
485KB
-
MD5
23f2e867ddbbe2e6c9e7959bae0df84e
-
SHA1
7a9568574654f6207804900ca0bb75c5413c363b
-
SHA256
b29df81720ce329eaa0f4304025431f95e2160b2d2c88c86ac37a33d030d54f4
-
SHA512
3eae942ac2b0e40179422058bd47813a1f9b8406dc961978b31c501d25aac743a6e7a4bb5068bb32293497c0ea37ec46aafeb856af1aa59505ad029b840b83bf
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64oigu:q31u
Score
10/10
Malware Config
Extracted
Family
oski
C2
103.114.107.28/l5/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 4856 4736 powershell.exe 23 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3348 4736 powershell.exe 22 PID 4736 wrote to memory of 3348 4736 powershell.exe 22 PID 4736 wrote to memory of 3348 4736 powershell.exe 22 PID 4736 wrote to memory of 1876 4736 powershell.exe 25 PID 4736 wrote to memory of 1876 4736 powershell.exe 25 PID 4736 wrote to memory of 1876 4736 powershell.exe 25 PID 4736 wrote to memory of 3236 4736 powershell.exe 24 PID 4736 wrote to memory of 3236 4736 powershell.exe 24 PID 4736 wrote to memory of 3236 4736 powershell.exe 24 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23 PID 4736 wrote to memory of 4856 4736 powershell.exe 23
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\23f2e867ddbbe2e6c9e7959bae0df84e.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:3348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:4856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:3236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd2⤵PID:1876
-