Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
d69b90af0812b7634f0214cd46f54ae0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d69b90af0812b7634f0214cd46f54ae0.exe
Resource
win10v2004-20240226-en
General
-
Target
d69b90af0812b7634f0214cd46f54ae0.exe
-
Size
842KB
-
MD5
d69b90af0812b7634f0214cd46f54ae0
-
SHA1
37e03ed8fa0e16a1e317c25bdf06bb0ab0565839
-
SHA256
acaa6723efbef5d53904d2d8e69d3c3e3f09a9e08cb17e1e79b00583316609c6
-
SHA512
50ad7203c97c5c43ab479b3503889686ef2f81e41779e7db9984ba068583c64a03c15a9eaf8b03c0c094c209060a40facaba6bbeb0f55298f7e6c0b750f6547e
-
SSDEEP
24576:voR6qgvRqwva/KnBPH2QYncjgngjobuytTN:Asjk1/KnJHqncjgbbbdN
Malware Config
Extracted
oski
193.142.58.164/www/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2688 1712 d69b90af0812b7634f0214cd46f54ae0.exe 30 PID 1712 wrote to memory of 2688 1712 d69b90af0812b7634f0214cd46f54ae0.exe 30 PID 1712 wrote to memory of 2688 1712 d69b90af0812b7634f0214cd46f54ae0.exe 30 PID 1712 wrote to memory of 2688 1712 d69b90af0812b7634f0214cd46f54ae0.exe 30 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32 PID 1712 wrote to memory of 588 1712 d69b90af0812b7634f0214cd46f54ae0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cdgPKOcGVD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBCE9.tmp"2⤵
- Creates scheduled task(s)
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"2⤵PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf6cd92f4239b85d22329df182f1cadc
SHA1c61233a859f2b56c9951ffd089e256a5fcc060b5
SHA25602ad419cf8f0bad9cba16857120a8391f41b3adf60ef152d0247a4183b00afb3
SHA5126eeb80be92284e56c2f41c4ac72571cf4f4004c16325e5b5b359f67f588cf0a42a2cbc3ceae86847b1e2d62a52e3b90b2fce6b45777f40d47f448be1db053a1c