Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
b43ae45b39a0647231b51c2d438a554e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b43ae45b39a0647231b51c2d438a554e.exe
Resource
win10v2004-20240226-en
General
-
Target
b43ae45b39a0647231b51c2d438a554e.exe
-
Size
696KB
-
MD5
b43ae45b39a0647231b51c2d438a554e
-
SHA1
7f7f55ef05410e17329dd3fb3c26e325f227592a
-
SHA256
a2013616892886b9fcd2067d2e77436c5233653772f6a6f235a325b1122c34a9
-
SHA512
d2edfdada863310d3feb6aac7eb72c3cda11dca1da36739f8a5a1e2dde4f131f70da6d7ef5d6d7e6c5c19fdab62d576a95514e3c8dca3ffce11dbe96a2720aa6
-
SSDEEP
12288:g9bDKZtBLE5x4T7RejE+BAdB1JLsSe/RXz/ZwgQiXG/IPQQ0pvRCph5kz1200CZ:EgLE5uTdejkRe/11wm21
Malware Config
Extracted
oski
zdd.divendesign.in
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 2868 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2184 b43ae45b39a0647231b51c2d438a554e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 b43ae45b39a0647231b51c2d438a554e.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2660 2184 b43ae45b39a0647231b51c2d438a554e.exe 28 PID 2184 wrote to memory of 2660 2184 b43ae45b39a0647231b51c2d438a554e.exe 28 PID 2184 wrote to memory of 2660 2184 b43ae45b39a0647231b51c2d438a554e.exe 28 PID 2184 wrote to memory of 2660 2184 b43ae45b39a0647231b51c2d438a554e.exe 28 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2184 wrote to memory of 2868 2184 b43ae45b39a0647231b51c2d438a554e.exe 29 PID 2868 wrote to memory of 2748 2868 b43ae45b39a0647231b51c2d438a554e.exe 30 PID 2868 wrote to memory of 2748 2868 b43ae45b39a0647231b51c2d438a554e.exe 30 PID 2868 wrote to memory of 2748 2868 b43ae45b39a0647231b51c2d438a554e.exe 30 PID 2868 wrote to memory of 2748 2868 b43ae45b39a0647231b51c2d438a554e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"{path}"2⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1123⤵
- Program crash
PID:2748
-
-