Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
b43ae45b39a0647231b51c2d438a554e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b43ae45b39a0647231b51c2d438a554e.exe
Resource
win10v2004-20240226-en
General
-
Target
b43ae45b39a0647231b51c2d438a554e.exe
-
Size
696KB
-
MD5
b43ae45b39a0647231b51c2d438a554e
-
SHA1
7f7f55ef05410e17329dd3fb3c26e325f227592a
-
SHA256
a2013616892886b9fcd2067d2e77436c5233653772f6a6f235a325b1122c34a9
-
SHA512
d2edfdada863310d3feb6aac7eb72c3cda11dca1da36739f8a5a1e2dde4f131f70da6d7ef5d6d7e6c5c19fdab62d576a95514e3c8dca3ffce11dbe96a2720aa6
-
SSDEEP
12288:g9bDKZtBLE5x4T7RejE+BAdB1JLsSe/RXz/ZwgQiXG/IPQQ0pvRCph5kz1200CZ:EgLE5uTdejkRe/11wm21
Malware Config
Extracted
oski
zdd.divendesign.in
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 -
Program crash 1 IoCs
pid pid_target Process procid_target 4240 4256 WerFault.exe 102 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102 PID 5084 wrote to memory of 4256 5084 b43ae45b39a0647231b51c2d438a554e.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\b43ae45b39a0647231b51c2d438a554e.exe"{path}"2⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 13083⤵
- Program crash
PID:4240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4256 -ip 42561⤵PID:2740