Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
da484abefb23789c13add9ecd7ea7eeb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
da484abefb23789c13add9ecd7ea7eeb.exe
Resource
win10v2004-20240226-en
General
-
Target
da484abefb23789c13add9ecd7ea7eeb.exe
-
Size
693KB
-
MD5
da484abefb23789c13add9ecd7ea7eeb
-
SHA1
cf0098c51761c3c9b860cdfd290734f0d1657bba
-
SHA256
223dfd54929007ac23d6a20dbcf81a519a14f1c4061d23afcb761b75796042d2
-
SHA512
380d3227555739a95ae2514fbe1f24882cbf91db508339837aee2fc6d1ac1c5a7feabcef9bf87ebc8b4efe6fa1f142f2ad9efd595899875fd1e416aa1965d368
-
SSDEEP
6144:eR5RLb7fVUQdGoKtqyknjzIaC+APzRXks3ccv78vSvFvvUvsvlvzvLvbv+vhvtDf:eR5NVbdjKcVPIjPzRXks3rgpES
Malware Config
Extracted
oski
http://2.56.59.226/www/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1336 set thread context of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2504 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main da484abefb23789c13add9ecd7ea7eeb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1336 da484abefb23789c13add9ecd7ea7eeb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1336 da484abefb23789c13add9ecd7ea7eeb.exe 1336 da484abefb23789c13add9ecd7ea7eeb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 1336 wrote to memory of 2504 1336 da484abefb23789c13add9ecd7ea7eeb.exe 28 PID 2504 wrote to memory of 2712 2504 da484abefb23789c13add9ecd7ea7eeb.exe 29 PID 2504 wrote to memory of 2712 2504 da484abefb23789c13add9ecd7ea7eeb.exe 29 PID 2504 wrote to memory of 2712 2504 da484abefb23789c13add9ecd7ea7eeb.exe 29 PID 2504 wrote to memory of 2712 2504 da484abefb23789c13add9ecd7ea7eeb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1163⤵
- Program crash
PID:2712
-
-