Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2024 06:58

General

  • Target

    5846831cfd75a1d686963ae3c628e00e.exe

  • Size

    1.2MB

  • MD5

    5846831cfd75a1d686963ae3c628e00e

  • SHA1

    d9782b477828369ce17e2ee95b51ecde7a55452f

  • SHA256

    a27d9f14392c00a3f786949ad7f9317c835dd564d2709b20f1ff2ea68fe46390

  • SHA512

    e437f5f33f5e20683ebd84898494618241c1489b94e445e9d69d330b93649641caf0b6997d160060acbc01a28776a6ac4a4b33b28c70278860fdc73d821f8743

  • SSDEEP

    24576:Eu6Jx3O0c+JY5UZ+XC0kGso/WaplzLTSjTAWY+:+I0c++OCvkGsUWapsY+

Malware Config

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5846831cfd75a1d686963ae3c628e00e.exe
    "C:\Users\Admin\AppData\Local\Temp\5846831cfd75a1d686963ae3c628e00e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Users\Admin\AppData\Local\Temp\5846831cfd75a1d686963ae3c628e00e.exe
      "C:\Users\Admin\AppData\Local\Temp\5846831cfd75a1d686963ae3c628e00e.exe"
      2⤵
        PID:1788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1212
          3⤵
          • Program crash
          PID:3524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1788 -ip 1788
      1⤵
        PID:2688

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1788-1-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1788-8-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/3888-0-0x0000000003EC0000-0x0000000003EED000-memory.dmp

        Filesize

        180KB

      • memory/3888-2-0x0000000003EF0000-0x0000000003EF1000-memory.dmp

        Filesize

        4KB