Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 19:08

General

  • Target

    c9626ce54f97b0bc2270eb091952ea53.exe

  • Size

    709KB

  • MD5

    c9626ce54f97b0bc2270eb091952ea53

  • SHA1

    21ee67939e626714aaeaa78d4c6010cbb0e19b7e

  • SHA256

    c76856f53bc950964cb30f0b48e80964b5162660608794d25ee919ce795796ba

  • SHA512

    06cab2593ced532f345cec2cd37ab5fc2135929580a41c6f10343926818465b1ecf1997b3b0fe45bded95e8e3c6258540a01d5c9b80f42b83309ee6b0befff43

  • SSDEEP

    12288:3LJu0WF/vuVlFUlat1mVeAc8CVijLA6s691+U/Ub1XQKAaC0fuke:7Jq8a5exdVijL7191t/UbZC

Malware Config

Extracted

Family

oski

C2

try.divendesign.in

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9626ce54f97b0bc2270eb091952ea53.exe
    "C:\Users\Admin\AppData\Local\Temp\c9626ce54f97b0bc2270eb091952ea53.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\c9626ce54f97b0bc2270eb091952ea53.exe
      "C:\Users\Admin\AppData\Local\Temp\c9626ce54f97b0bc2270eb091952ea53.exe"
      2⤵
        PID:1124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 1304
          3⤵
          • Program crash
          PID:3572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1124 -ip 1124
      1⤵
        PID:432

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1124-12-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1124-20-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1124-16-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1124-15-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/1124-13-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3412-4-0x0000000007B40000-0x0000000007BDC000-memory.dmp

        Filesize

        624KB

      • memory/3412-6-0x0000000007A50000-0x0000000007A5A000-memory.dmp

        Filesize

        40KB

      • memory/3412-7-0x0000000002E20000-0x0000000002E38000-memory.dmp

        Filesize

        96KB

      • memory/3412-8-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3412-9-0x0000000007A10000-0x0000000007A20000-memory.dmp

        Filesize

        64KB

      • memory/3412-10-0x0000000009010000-0x00000000090BA000-memory.dmp

        Filesize

        680KB

      • memory/3412-11-0x0000000006690000-0x00000000066D0000-memory.dmp

        Filesize

        256KB

      • memory/3412-5-0x0000000007A10000-0x0000000007A20000-memory.dmp

        Filesize

        64KB

      • memory/3412-0-0x0000000000AC0000-0x0000000000B78000-memory.dmp

        Filesize

        736KB

      • memory/3412-3-0x0000000007AA0000-0x0000000007B32000-memory.dmp

        Filesize

        584KB

      • memory/3412-2-0x0000000007FB0000-0x0000000008554000-memory.dmp

        Filesize

        5.6MB

      • memory/3412-17-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3412-1-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB