Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 11:52
Static task
static1
Behavioral task
behavioral1
Sample
3519d9884a37f6e79b9e5f19b97a3d99.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3519d9884a37f6e79b9e5f19b97a3d99.exe
Resource
win10v2004-20231215-en
General
-
Target
3519d9884a37f6e79b9e5f19b97a3d99.exe
-
Size
1.3MB
-
MD5
3519d9884a37f6e79b9e5f19b97a3d99
-
SHA1
49d06c39e5664977651d4e16d00ebcad6659917c
-
SHA256
488482565caeb316c3182e323a178f0357878a3b564bb22abff6ffb01feb051a
-
SHA512
a5f8fbd4197a4962f75d30fab5c6c7de0f5e0b137dc5de8cad10a25bdaf9ff60a78fd35bdb9fbb2402762e0332a445974d92284ee39169505282be17051d0060
-
SSDEEP
24576:TsV676DOVfx8Dgyfx8Dg1TQU8vYB7r+UCmDW0t5xSNwDZZGL:W676c58Dgy58DgNQU8+dk0dSCZU
Malware Config
Extracted
oski
http://2.56.59.226/www/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1664 2812 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 1940 wrote to memory of 2812 1940 3519d9884a37f6e79b9e5f19b97a3d99.exe 29 PID 2812 wrote to memory of 1664 2812 3519d9884a37f6e79b9e5f19b97a3d99.exe 33 PID 2812 wrote to memory of 1664 2812 3519d9884a37f6e79b9e5f19b97a3d99.exe 33 PID 2812 wrote to memory of 1664 2812 3519d9884a37f6e79b9e5f19b97a3d99.exe 33 PID 2812 wrote to memory of 1664 2812 3519d9884a37f6e79b9e5f19b97a3d99.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3519d9884a37f6e79b9e5f19b97a3d99.exe"C:\Users\Admin\AppData\Local\Temp\3519d9884a37f6e79b9e5f19b97a3d99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\3519d9884a37f6e79b9e5f19b97a3d99.exe"C:\Users\Admin\AppData\Local\Temp\3519d9884a37f6e79b9e5f19b97a3d99.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 6203⤵
- Program crash
PID:1664
-
-