Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
452e6c334e555629c538c4aa6b2adc26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
452e6c334e555629c538c4aa6b2adc26.exe
Resource
win10v2004-20231215-en
General
-
Target
452e6c334e555629c538c4aa6b2adc26.exe
-
Size
792KB
-
MD5
452e6c334e555629c538c4aa6b2adc26
-
SHA1
f24a31707b2b0037adcc712b0d83541074f909d2
-
SHA256
44aa270e4c081241057bad8c1d0ea5864087325f8e3209aa10747f108123f718
-
SHA512
1412c3682f9c0e239743450d7ce86b37e726101f5f1786fe215dfd18c61911f31f13533549c3af2033ce6dbf47dc638466283dca62fd8df062ea2a65e3fd811a
-
SSDEEP
12288:YcaQxt8LiULbgDPwFVt2NjFhslyAz1+LC6oSU4Acp82cz8/mNMgMRyLcvyQQGSI:NGb0wFVMNjTsl9zwLCZGAa8mqaQeW
Malware Config
Extracted
oski
185.212.131.198/ww/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2900 3068 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 3068 wrote to memory of 2900 3068 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 3068 wrote to memory of 2900 3068 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 3068 wrote to memory of 2900 3068 452e6c334e555629c538c4aa6b2adc26.exe 30 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32 PID 3068 wrote to memory of 1672 3068 452e6c334e555629c538c4aa6b2adc26.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqppCjWADhQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp760A.tmp"2⤵
- Creates scheduled task(s)
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"C:\Users\Admin\AppData\Local\Temp\452e6c334e555629c538c4aa6b2adc26.exe"2⤵PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f127b7c768f72d25fc0af8f40b78da0
SHA1899cfaaab6ff3213aaabc95ef1b204abb32dd8e3
SHA2564ef1580cea2b10ba6ecedc8654e199c109ffe42fed00cba4d3bf9453160ed309
SHA51274c59ca324d81c9d9da23fdd6e8237636ac59cf3080599d7ffefb02aad60618cb2838fc111d2b5b6eb7f68d9fd1cf695d846618ba3aa8a9cce4c9d809ee628ad