Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
d69b90af0812b7634f0214cd46f54ae0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d69b90af0812b7634f0214cd46f54ae0.exe
Resource
win10v2004-20240226-en
General
-
Target
d69b90af0812b7634f0214cd46f54ae0.exe
-
Size
842KB
-
MD5
d69b90af0812b7634f0214cd46f54ae0
-
SHA1
37e03ed8fa0e16a1e317c25bdf06bb0ab0565839
-
SHA256
acaa6723efbef5d53904d2d8e69d3c3e3f09a9e08cb17e1e79b00583316609c6
-
SHA512
50ad7203c97c5c43ab479b3503889686ef2f81e41779e7db9984ba068583c64a03c15a9eaf8b03c0c094c209060a40facaba6bbeb0f55298f7e6c0b750f6547e
-
SSDEEP
24576:voR6qgvRqwva/KnBPH2QYncjgngjobuytTN:Asjk1/KnJHqncjgbbbdN
Malware Config
Extracted
oski
193.142.58.164/www/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation d69b90af0812b7634f0214cd46f54ae0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4076 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4076 1788 d69b90af0812b7634f0214cd46f54ae0.exe 110 PID 1788 wrote to memory of 4076 1788 d69b90af0812b7634f0214cd46f54ae0.exe 110 PID 1788 wrote to memory of 4076 1788 d69b90af0812b7634f0214cd46f54ae0.exe 110 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112 PID 1788 wrote to memory of 928 1788 d69b90af0812b7634f0214cd46f54ae0.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cdgPKOcGVD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEDD6.tmp"2⤵
- Creates scheduled task(s)
PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"C:\Users\Admin\AppData\Local\Temp\d69b90af0812b7634f0214cd46f54ae0.exe"2⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4488 --field-trial-handle=2432,i,12161922670941700748,3348345705955601576,262144 --variations-seed-version /prefetch:81⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568adfa6c76bfda417a520d5c0216e9ba
SHA194d155877cc088d436b990b7dc9fa70d0c91080e
SHA25605aebe0997d1e7676ee7c219cedf3cbe9d445b78b75ee6f734d5e719ab198d4b
SHA51289882914e8d61b4e4e2fcf50baa1eac02e792064afcf0ef2db2cfe8d3492608a17ea9cd3a66d4d4154d489aa40fed8a91ba9380bfbca0ca0c1c75f895cf950eb