Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 08:15

General

  • Target

    b43ae45b39a0647231b51c2d438a554e.exe

  • Size

    696KB

  • MD5

    b43ae45b39a0647231b51c2d438a554e

  • SHA1

    7f7f55ef05410e17329dd3fb3c26e325f227592a

  • SHA256

    a2013616892886b9fcd2067d2e77436c5233653772f6a6f235a325b1122c34a9

  • SHA512

    d2edfdada863310d3feb6aac7eb72c3cda11dca1da36739f8a5a1e2dde4f131f70da6d7ef5d6d7e6c5c19fdab62d576a95514e3c8dca3ffce11dbe96a2720aa6

  • SSDEEP

    12288:g9bDKZtBLE5x4T7RejE+BAdB1JLsSe/RXz/ZwgQiXG/IPQQ0pvRCph5kz1200CZ:EgLE5uTdejkRe/11wm21

Score
10/10

Malware Config

Extracted

Family

oski

C2

zdd.divendesign.in

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe
    "C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe
      "{path}"
      2⤵
        PID:2660
      • C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe
        "{path}"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 112
          3⤵
          • Program crash
          PID:2748

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2184-21-0x0000000074D50000-0x000000007543E000-memory.dmp

      Filesize

      6.9MB

    • memory/2184-1-0x0000000074D50000-0x000000007543E000-memory.dmp

      Filesize

      6.9MB

    • memory/2184-2-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

      Filesize

      256KB

    • memory/2184-3-0x00000000009C0000-0x00000000009C8000-memory.dmp

      Filesize

      32KB

    • memory/2184-4-0x0000000074D50000-0x000000007543E000-memory.dmp

      Filesize

      6.9MB

    • memory/2184-5-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

      Filesize

      256KB

    • memory/2184-6-0x0000000007F70000-0x0000000007FF6000-memory.dmp

      Filesize

      536KB

    • memory/2184-7-0x0000000000C00000-0x0000000000C3A000-memory.dmp

      Filesize

      232KB

    • memory/2184-0-0x00000000012E0000-0x0000000001394000-memory.dmp

      Filesize

      720KB

    • memory/2868-8-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2868-14-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-18-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-12-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-9-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-10-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2868-20-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB