Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
5f0969cdd00801051ff7f2afd2343ff3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f0969cdd00801051ff7f2afd2343ff3.exe
Resource
win10v2004-20231222-en
General
-
Target
5f0969cdd00801051ff7f2afd2343ff3.exe
-
Size
789KB
-
MD5
5f0969cdd00801051ff7f2afd2343ff3
-
SHA1
6bbf42e0b05b025e8162404435eb1b25cc07d5f8
-
SHA256
43460a1724b2521dd5e97c68c16edfce9caf22d49452efd956a64db91b5935a7
-
SHA512
0b89a31ae863641dd0b87a7cedb566241e0df84a685f7df73e04c14580b16f80d3042eeaae65a2a09f2772187ff73d0d833f2cfad0663ba4b4a1e8a66c23a9dd
-
SSDEEP
24576:seV+CQ38aT1m7NKsDTxe1/6hTMLevYWhzDcUjMFA:DV+CQ33T1m70sDTkhYM
Malware Config
Extracted
oski
tunqyuindia.com/mar3/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 5f0969cdd00801051ff7f2afd2343ff3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1156 232 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2204 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 101 PID 1708 wrote to memory of 2204 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 101 PID 1708 wrote to memory of 2204 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 101 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103 PID 1708 wrote to memory of 232 1708 5f0969cdd00801051ff7f2afd2343ff3.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f0969cdd00801051ff7f2afd2343ff3.exe"C:\Users\Admin\AppData\Local\Temp\5f0969cdd00801051ff7f2afd2343ff3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vTKyEeK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp270B.tmp"2⤵
- Creates scheduled task(s)
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\5f0969cdd00801051ff7f2afd2343ff3.exe"C:\Users\Admin\AppData\Local\Temp\5f0969cdd00801051ff7f2afd2343ff3.exe"2⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 13003⤵
- Program crash
PID:1156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 232 -ip 2321⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5508cf3d7b010c06348cdad05f3c77034
SHA1c32c9d7209ca4413623ddf7ee46e29c01927aef8
SHA25627462574074d4b63c57e7cd300b7f8403ba1166d9ef4037153cb1f4eca142624
SHA5125cbb9eddb7e51f65e4874377ba8cd87cabcc86884a8ba0a82b46bd6cbfa7237d7abae96f729abb934cbef73d9cf8640d1923d2445e8530e6c6325c326e7ecb43