Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
dac9484cbfa5767670567eec53d8979b.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dac9484cbfa5767670567eec53d8979b.ps1
Resource
win10v2004-20240226-en
General
-
Target
dac9484cbfa5767670567eec53d8979b.ps1
-
Size
421KB
-
MD5
dac9484cbfa5767670567eec53d8979b
-
SHA1
e920708eb445d8f822d5a85d726bfddaa27dd00f
-
SHA256
d02672efdf8edc3a02c71889fc5f04ffd4d469de77cca44764edee4592b89ce2
-
SHA512
cde490119de920287b6d6e7ba84820690b553976b4afe013c53565088383e53a3dfd84bab3808d79a6ba6b4459a9abdd6dd8feda89d6a90f6dc5b6d8997d276f
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw644L68:q3j
Malware Config
Extracted
oski
/103.114.107.28/l22/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 844 set thread context of 2972 844 powershell.exe 29 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2576 2972 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 844 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
powershell.exeMSBuild.exedescription pid Process procid_target PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 844 wrote to memory of 2972 844 powershell.exe 29 PID 2972 wrote to memory of 2576 2972 MSBuild.exe 30 PID 2972 wrote to memory of 2576 2972 MSBuild.exe 30 PID 2972 wrote to memory of 2576 2972 MSBuild.exe 30 PID 2972 wrote to memory of 2576 2972 MSBuild.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\dac9484cbfa5767670567eec53d8979b.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 5003⤵
- Program crash
PID:2576
-
-