Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
530792b4cfa0029b904ae5130fe1d265.ps1
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
530792b4cfa0029b904ae5130fe1d265.ps1
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
530792b4cfa0029b904ae5130fe1d265.ps1
-
Size
421KB
-
MD5
530792b4cfa0029b904ae5130fe1d265
-
SHA1
37a8e553cf5c1d21b8894ed520293ad1e35dadfb
-
SHA256
341efe957c47c866377854003f2bc59907ea2cebb98728121cc68f3b94e2c835
-
SHA512
0f7c53e9636a49de7c7dcdfe18af627e91e0d7579cb0c748f858e21bf74c31a7eaf75e2cf73770793ce5df8952977b0b81293e0ff80ede5e8a8247f1833c89f7
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64gL68:q3f
Score
10/10
Malware Config
Extracted
Family
oski
C2
103.114.107.28/l15/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 2808 1352 powershell.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2808 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1352 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 1352 wrote to memory of 2808 1352 powershell.exe 29 PID 2808 wrote to memory of 2736 2808 MSBuild.exe 30 PID 2808 wrote to memory of 2736 2808 MSBuild.exe 30 PID 2808 wrote to memory of 2736 2808 MSBuild.exe 30 PID 2808 wrote to memory of 2736 2808 MSBuild.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\530792b4cfa0029b904ae5130fe1d265.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 1123⤵
- Program crash
PID:2736
-
-