Analysis
-
max time kernel
137s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
3c7485ba08cb4cb5c9af2fd0e670efee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c7485ba08cb4cb5c9af2fd0e670efee.exe
Resource
win10v2004-20231222-en
General
-
Target
3c7485ba08cb4cb5c9af2fd0e670efee.exe
-
Size
1.1MB
-
MD5
3c7485ba08cb4cb5c9af2fd0e670efee
-
SHA1
bb0a4d2f63e42b269f9d7b9b894fb731093cda9e
-
SHA256
e5c692ae3dc9c88bd07613f088686835c2e4ea2755c6abbdc01bac7bce5b924a
-
SHA512
8a8095eb685cbbf0cbed9c4cc11bd4b86d56c60922a6625dc86546f37dfe0c356a4066832e2e60083342c1a1e3749d6ca2f09c894779f055fac9e9c8c03b43c0
-
SSDEEP
12288:Hg5BQaiYOSaDV5bvh2days0tGLKe+ML+QrX/6GXVUJsSgWiE9Y:A5BQaT2DLNl90tGn+hQr/nsn9Y
Malware Config
Extracted
oski
2tril.com
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 -
Program crash 1 IoCs
pid pid_target Process procid_target 4776 4252 WerFault.exe 95 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95 PID 2632 wrote to memory of 4252 2632 3c7485ba08cb4cb5c9af2fd0e670efee.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7485ba08cb4cb5c9af2fd0e670efee.exe"C:\Users\Admin\AppData\Local\Temp\3c7485ba08cb4cb5c9af2fd0e670efee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3c7485ba08cb4cb5c9af2fd0e670efee.exe"C:\Users\Admin\AppData\Local\Temp\3c7485ba08cb4cb5c9af2fd0e670efee.exe"2⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 13283⤵
- Program crash
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4252 -ip 42521⤵PID:1892