Analysis

  • max time kernel
    74s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 05:45

General

  • Target

    3c0aae14c733b8f3b5f15d3f066e343d.exe

  • Size

    1.1MB

  • MD5

    3c0aae14c733b8f3b5f15d3f066e343d

  • SHA1

    a75840830a4a95f779809f4d52ad7328de9e4c6f

  • SHA256

    fd16c60e634e807f6bbb7c3e6e12a4231b7b34851eb98d6da2f178b6125c536f

  • SHA512

    d97683d0a10a9e4131e0212e0d030bac4237402704da24b20997ae48abbf71d04a3d703d1b2b8c79875d15f0c16ba8868888a08b26eaaac96454175a99fa3700

  • SSDEEP

    12288:O/8XZuGwgtGb74uChgDCe83dHY3XJEkKBiy8CalBmNWab9UXvBJZQ63GvIZDgQ:O/g5g74nGDCJxWXSfBihmECSfBJ

Score
10/10

Malware Config

Extracted

Family

oski

C2

kckark.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe
    "C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe
      "C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe"
      2⤵
        PID:1524
      • C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe
        "C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe"
        2⤵
          PID:1172
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 772
            3⤵
            • Program crash
            PID:2968
        • C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe
          "C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe"
          2⤵
            PID:2684
          • C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe
            "C:\Users\Admin\AppData\Local\Temp\3c0aae14c733b8f3b5f15d3f066e343d.exe"
            2⤵
              PID:2168

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1172-20-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1172-12-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-24-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-8-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-10-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-14-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-16-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-22-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1172-26-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1752-2-0x0000000004870000-0x00000000048B0000-memory.dmp

            Filesize

            256KB

          • memory/1752-23-0x00000000741E0000-0x00000000748CE000-memory.dmp

            Filesize

            6.9MB

          • memory/1752-1-0x00000000741E0000-0x00000000748CE000-memory.dmp

            Filesize

            6.9MB

          • memory/1752-0-0x0000000000970000-0x0000000000A88000-memory.dmp

            Filesize

            1.1MB

          • memory/1752-7-0x00000000050A0000-0x00000000050D8000-memory.dmp

            Filesize

            224KB

          • memory/1752-6-0x00000000008C0000-0x0000000000960000-memory.dmp

            Filesize

            640KB

          • memory/1752-5-0x0000000004870000-0x00000000048B0000-memory.dmp

            Filesize

            256KB

          • memory/1752-4-0x00000000741E0000-0x00000000748CE000-memory.dmp

            Filesize

            6.9MB

          • memory/1752-3-0x0000000000500000-0x000000000051E000-memory.dmp

            Filesize

            120KB