Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2024 01:01

General

  • Target

    da484abefb23789c13add9ecd7ea7eeb.exe

  • Size

    693KB

  • MD5

    da484abefb23789c13add9ecd7ea7eeb

  • SHA1

    cf0098c51761c3c9b860cdfd290734f0d1657bba

  • SHA256

    223dfd54929007ac23d6a20dbcf81a519a14f1c4061d23afcb761b75796042d2

  • SHA512

    380d3227555739a95ae2514fbe1f24882cbf91db508339837aee2fc6d1ac1c5a7feabcef9bf87ebc8b4efe6fa1f142f2ad9efd595899875fd1e416aa1965d368

  • SSDEEP

    6144:eR5RLb7fVUQdGoKtqyknjzIaC+APzRXks3ccv78vSvFvvUvsvlvzvLvbv+vhvtDf:eR5NVbdjKcVPIjPzRXks3rgpES

Score
10/10

Malware Config

Extracted

Family

oski

C2

http://2.56.59.226/www/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe
      "C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 116
        3⤵
        • Program crash
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1336-22-0x00000000048E0000-0x0000000004920000-memory.dmp

    Filesize

    256KB

  • memory/1336-1-0x0000000074A00000-0x00000000750EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1336-2-0x00000000048E0000-0x0000000004920000-memory.dmp

    Filesize

    256KB

  • memory/1336-3-0x00000000048E0000-0x0000000004920000-memory.dmp

    Filesize

    256KB

  • memory/1336-4-0x00000000048E0000-0x0000000004920000-memory.dmp

    Filesize

    256KB

  • memory/1336-5-0x00000000048E0000-0x0000000004920000-memory.dmp

    Filesize

    256KB

  • memory/1336-7-0x00000000056A0000-0x0000000005724000-memory.dmp

    Filesize

    528KB

  • memory/1336-23-0x0000000074A00000-0x00000000750EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1336-0-0x0000000001040000-0x00000000010F4000-memory.dmp

    Filesize

    720KB

  • memory/2504-10-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-13-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-15-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-17-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-18-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2504-20-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-11-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-8-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-24-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB