Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
452e6c334e555629c538c4aa6b2adc26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
452e6c334e555629c538c4aa6b2adc26.exe
Resource
win10v2004-20231215-en
General
-
Target
452e6c334e555629c538c4aa6b2adc26.exe
-
Size
792KB
-
MD5
452e6c334e555629c538c4aa6b2adc26
-
SHA1
f24a31707b2b0037adcc712b0d83541074f909d2
-
SHA256
44aa270e4c081241057bad8c1d0ea5864087325f8e3209aa10747f108123f718
-
SHA512
1412c3682f9c0e239743450d7ce86b37e726101f5f1786fe215dfd18c61911f31f13533549c3af2033ce6dbf47dc638466283dca62fd8df062ea2a65e3fd811a
-
SSDEEP
12288:YcaQxt8LiULbgDPwFVt2NjFhslyAz1+LC6oSU4Acp82cz8/mNMgMRyLcvyQQGSI:NGb0wFVMNjTsl9zwLCZGAa8mqaQeW
Malware Config
Extracted
oski
185.212.131.198/ww/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2448 set thread context of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 1988 2816 WerFault.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2000 2448 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 2448 wrote to memory of 2000 2448 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 2448 wrote to memory of 2000 2448 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 2448 wrote to memory of 2000 2448 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2448 wrote to memory of 2816 2448 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 2816 wrote to memory of 1988 2816 452e6c334e555629c538c4aa6b2adc26.exe 31 PID 2816 wrote to memory of 1988 2816 452e6c334e555629c538c4aa6b2adc26.exe 31 PID 2816 wrote to memory of 1988 2816 452e6c334e555629c538c4aa6b2adc26.exe 31 PID 2816 wrote to memory of 1988 2816 452e6c334e555629c538c4aa6b2adc26.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqppCjWADhQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1BE.tmp"2⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 1121⤵
- Program crash
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5069fdce77ba3d0cbf7baff5ade618659
SHA1cea38eafebf6058838c7834e7ebbafe306540efd
SHA256a9ab4405979c67059d135283580d22e6afbad89485c688d84564354819af5b19
SHA5128bb1c4e6fd25aa8c27774493bbfefc6933b327b1047320cf45196a23848b46b1b0b4b94804516136864ad13f1154b7540e7b3ac7c8b81d378da28e6d0fe80153