Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 08:15

General

  • Target

    b43ae45b39a0647231b51c2d438a554e.exe

  • Size

    696KB

  • MD5

    b43ae45b39a0647231b51c2d438a554e

  • SHA1

    7f7f55ef05410e17329dd3fb3c26e325f227592a

  • SHA256

    a2013616892886b9fcd2067d2e77436c5233653772f6a6f235a325b1122c34a9

  • SHA512

    d2edfdada863310d3feb6aac7eb72c3cda11dca1da36739f8a5a1e2dde4f131f70da6d7ef5d6d7e6c5c19fdab62d576a95514e3c8dca3ffce11dbe96a2720aa6

  • SSDEEP

    12288:g9bDKZtBLE5x4T7RejE+BAdB1JLsSe/RXz/ZwgQiXG/IPQQ0pvRCph5kz1200CZ:EgLE5uTdejkRe/11wm21

Malware Config

Extracted

Family

oski

C2

zdd.divendesign.in

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe
    "C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe
      "{path}"
      2⤵
        PID:4256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 1308
          3⤵
          • Program crash
          PID:4240
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4256 -ip 4256
      1⤵
        PID:2740

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4256-12-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4256-20-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4256-16-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4256-15-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4256-13-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/5084-4-0x0000000005D00000-0x0000000005D10000-memory.dmp

        Filesize

        64KB

      • memory/5084-6-0x0000000005EA0000-0x0000000005EA8000-memory.dmp

        Filesize

        32KB

      • memory/5084-7-0x0000000006ED0000-0x0000000006F6C000-memory.dmp

        Filesize

        624KB

      • memory/5084-8-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/5084-9-0x0000000005D00000-0x0000000005D10000-memory.dmp

        Filesize

        64KB

      • memory/5084-10-0x0000000009B90000-0x0000000009C16000-memory.dmp

        Filesize

        536KB

      • memory/5084-11-0x0000000009B40000-0x0000000009B7A000-memory.dmp

        Filesize

        232KB

      • memory/5084-5-0x0000000005A20000-0x0000000005A2A000-memory.dmp

        Filesize

        40KB

      • memory/5084-0-0x0000000000F70000-0x0000000001024000-memory.dmp

        Filesize

        720KB

      • memory/5084-3-0x0000000005A70000-0x0000000005B02000-memory.dmp

        Filesize

        584KB

      • memory/5084-2-0x0000000005F80000-0x0000000006524000-memory.dmp

        Filesize

        5.6MB

      • memory/5084-17-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/5084-1-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB