Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
406171ecbe8c3d96852acef91ec2e6db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
406171ecbe8c3d96852acef91ec2e6db.exe
Resource
win10v2004-20231215-en
General
-
Target
406171ecbe8c3d96852acef91ec2e6db.exe
-
Size
571KB
-
MD5
406171ecbe8c3d96852acef91ec2e6db
-
SHA1
5fb7a4fc46659b510fbcbb51d9e08bdf08490b62
-
SHA256
8e07cf5e12ed70918b410fdb95fdf6905c191df169df5fdf994daac99c8bd359
-
SHA512
d0c472148ded74e627d33f1f1124b9275ba8ab9d2cb1443a88ebfecce57755b7e88d39e77819bbba75dad6cf905ba85e5372ca9341790f56e121263ababf10a3
-
SSDEEP
12288:B5tM+E02iNv4sxxrMAbU3Sg9r28R1g9lHQI0uS:vbE01usjMMuSg96WIjV
Malware Config
Extracted
oski
fair.le-pearl.com
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2200 2860 WerFault.exe 30 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2076 406171ecbe8c3d96852acef91ec2e6db.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 406171ecbe8c3d96852acef91ec2e6db.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2636 2076 406171ecbe8c3d96852acef91ec2e6db.exe 28 PID 2076 wrote to memory of 2636 2076 406171ecbe8c3d96852acef91ec2e6db.exe 28 PID 2076 wrote to memory of 2636 2076 406171ecbe8c3d96852acef91ec2e6db.exe 28 PID 2076 wrote to memory of 2636 2076 406171ecbe8c3d96852acef91ec2e6db.exe 28 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2076 wrote to memory of 2860 2076 406171ecbe8c3d96852acef91ec2e6db.exe 30 PID 2860 wrote to memory of 2200 2860 406171ecbe8c3d96852acef91ec2e6db.exe 32 PID 2860 wrote to memory of 2200 2860 406171ecbe8c3d96852acef91ec2e6db.exe 32 PID 2860 wrote to memory of 2200 2860 406171ecbe8c3d96852acef91ec2e6db.exe 32 PID 2860 wrote to memory of 2200 2860 406171ecbe8c3d96852acef91ec2e6db.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\406171ecbe8c3d96852acef91ec2e6db.exe"C:\Users\Admin\AppData\Local\Temp\406171ecbe8c3d96852acef91ec2e6db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YmTlkQcO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8FC1.tmp"2⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\406171ecbe8c3d96852acef91ec2e6db.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 8003⤵
- Program crash
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD508709ec66d8aa701c84df997d9efab61
SHA1e718b9d7c15a6a46ffe313531992b54b13becedc
SHA2561ce4120e86eb44ded1fc5a096ce0229cfd7c255d864971d782827072548f4316
SHA5128506a5e1e79c6f233ff126c378b44549b52a88681206cf2fa9e9c00fc7d9bbb5130963d1fab47b052c832a1579990ea7d0ca362020222109de615945c8dd2954