Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
93fffc6736b1dd95a4f4e88734e9d540.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
93fffc6736b1dd95a4f4e88734e9d540.exe
Resource
win10v2004-20231215-en
General
-
Target
93fffc6736b1dd95a4f4e88734e9d540.exe
-
Size
252KB
-
MD5
93fffc6736b1dd95a4f4e88734e9d540
-
SHA1
509a9acffd9b9123fff2a3df9a860b829210f80a
-
SHA256
80b57df21ba993430e49e63e47f1afd84ac2f64fe50bb0b19413b2f964c42dd0
-
SHA512
d56d6e46792df1b06449265973e589559ff630ea2bcbcae54ffd0503188477605a63ca4db38f8e5e29d472368902e959f850226cf3ddaa2c0d6ba6ac3b87faed
-
SSDEEP
6144:vgELakzf1pZVv7cBBn3dELFmAD9/drJnguU9:lj75VcDEpHFJNU9
Malware Config
Extracted
oski
danielmax.ac.ug
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2620 2124 WerFault.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2752 93fffc6736b1dd95a4f4e88734e9d540.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 93fffc6736b1dd95a4f4e88734e9d540.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 PID 2752 wrote to memory of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 PID 2752 wrote to memory of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 PID 2752 wrote to memory of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 PID 2752 wrote to memory of 2124 2752 93fffc6736b1dd95a4f4e88734e9d540.exe 28 PID 2124 wrote to memory of 2620 2124 93fffc6736b1dd95a4f4e88734e9d540.exe 31 PID 2124 wrote to memory of 2620 2124 93fffc6736b1dd95a4f4e88734e9d540.exe 31 PID 2124 wrote to memory of 2620 2124 93fffc6736b1dd95a4f4e88734e9d540.exe 31 PID 2124 wrote to memory of 2620 2124 93fffc6736b1dd95a4f4e88734e9d540.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\93fffc6736b1dd95a4f4e88734e9d540.exe"C:\Users\Admin\AppData\Local\Temp\93fffc6736b1dd95a4f4e88734e9d540.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\93fffc6736b1dd95a4f4e88734e9d540.exe"C:\Users\Admin\AppData\Local\Temp\93fffc6736b1dd95a4f4e88734e9d540.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 7683⤵
- Program crash
PID:2620
-
-