Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 16:45

General

  • Target

    a6d680a1f920defdc3723fbf65b27924.exe

  • Size

    914KB

  • MD5

    a6d680a1f920defdc3723fbf65b27924

  • SHA1

    b9aab4c0e7164c1a05aa61a2f69cfa32be802607

  • SHA256

    c0a28f12669aa6c5b1846e0e00a85806281911ff3c41817d6b912ac2ca9d7cf5

  • SHA512

    fe3f2d47a001bd35704ecaeb44ae02a60542df009e5bc848e3e0a294a06e7a9bf0e8f16b7a41169fe5060f09e09247a1902e8ff73c95499c41bc6d9308e144be

  • SSDEEP

    12288:Hm40TIcHHXUMcg+H1twu8msICrwtBiq8uWutD6sOAeCP2Dc9F3nC0Py3gAhw:4hHHX9f4YwNi8W2yAeCPP

Malware Config

Extracted

Family

oski

C2

kckark.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6d680a1f920defdc3723fbf65b27924.exe
    "C:\Users\Admin\AppData\Local\Temp\a6d680a1f920defdc3723fbf65b27924.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\a6d680a1f920defdc3723fbf65b27924.exe
      "C:\Users\Admin\AppData\Local\Temp\a6d680a1f920defdc3723fbf65b27924.exe"
      2⤵
        PID:1316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1296
          3⤵
          • Program crash
          PID:3588
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1316 -ip 1316
      1⤵
        PID:1504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/752-8-0x0000000005440000-0x0000000005458000-memory.dmp

        Filesize

        96KB

      • memory/752-7-0x0000000005150000-0x00000000051A6000-memory.dmp

        Filesize

        344KB

      • memory/752-0-0x00000000004A0000-0x000000000058A000-memory.dmp

        Filesize

        936KB

      • memory/752-3-0x00000000055C0000-0x0000000005B64000-memory.dmp

        Filesize

        5.6MB

      • memory/752-4-0x00000000050B0000-0x0000000005142000-memory.dmp

        Filesize

        584KB

      • memory/752-5-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/752-6-0x0000000005020000-0x000000000502A000-memory.dmp

        Filesize

        40KB

      • memory/752-18-0x0000000074820000-0x0000000074FD0000-memory.dmp

        Filesize

        7.7MB

      • memory/752-2-0x0000000004F70000-0x000000000500C000-memory.dmp

        Filesize

        624KB

      • memory/752-1-0x0000000074820000-0x0000000074FD0000-memory.dmp

        Filesize

        7.7MB

      • memory/752-11-0x0000000008250000-0x00000000082F0000-memory.dmp

        Filesize

        640KB

      • memory/752-10-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/752-12-0x000000000A9E0000-0x000000000AA18000-memory.dmp

        Filesize

        224KB

      • memory/752-9-0x0000000074820000-0x0000000074FD0000-memory.dmp

        Filesize

        7.7MB

      • memory/1316-21-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1316-16-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1316-17-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1316-14-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1316-13-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB