Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
8c7c82469de5aacc1025699b79718847.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c7c82469de5aacc1025699b79718847.exe
Resource
win10v2004-20231222-en
General
-
Target
8c7c82469de5aacc1025699b79718847.exe
-
Size
1001KB
-
MD5
8c7c82469de5aacc1025699b79718847
-
SHA1
46d38208bc64db83dc306d05870675f3b4208389
-
SHA256
f5abfba489bfcef9819f0ca20cd54efc779d6091f6462b6083c363636739f41b
-
SHA512
f92280edc4c212c08e93e9a47a0da5036550d899e4f8db75ef4de5bfb39ac9a9e87a8e166fb53af5ca1b3ef4755c83526912735fd07e5c74011e5a8d721c46f2
-
SSDEEP
12288:3d5HEJbjJEKY+WddGJHbhfqO+sGxVgtdsTe6czZuGmSsPJcEljysDc9F3nC0Py3x:9Nm9rZP6MQ/Rq
Malware Config
Extracted
oski
kckark.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4756 set thread context of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 4876 4872 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4756 8c7c82469de5aacc1025699b79718847.exe 4756 8c7c82469de5aacc1025699b79718847.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4756 8c7c82469de5aacc1025699b79718847.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1996 4756 8c7c82469de5aacc1025699b79718847.exe 96 PID 4756 wrote to memory of 1996 4756 8c7c82469de5aacc1025699b79718847.exe 96 PID 4756 wrote to memory of 1996 4756 8c7c82469de5aacc1025699b79718847.exe 96 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97 PID 4756 wrote to memory of 4872 4756 8c7c82469de5aacc1025699b79718847.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"2⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"C:\Users\Admin\AppData\Local\Temp\8c7c82469de5aacc1025699b79718847.exe"2⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 12843⤵
- Program crash
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4872 -ip 48721⤵PID:376