Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/03/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
dc7cce7fed750c48705f46022f2f9079.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc7cce7fed750c48705f46022f2f9079.ps1
Resource
win10v2004-20240226-en
General
-
Target
dc7cce7fed750c48705f46022f2f9079.ps1
-
Size
421KB
-
MD5
dc7cce7fed750c48705f46022f2f9079
-
SHA1
8dd2028110b31271ae6295b378e9ba435ff124ed
-
SHA256
9472ff0cd262c6be42e1dd53b1553db0e46022c3133dbeacd3d004d6bfc59bdc
-
SHA512
db47b205be5ee7d15ddd9765eaed5e1aba8558438ef52bbb4a4324a2428cb5f4a2094fb131f821bead518b791bf0d6d4f5bf8b3112cdc46b695d8851d3e151d8
-
SSDEEP
12288:+Zjw0RJ9u5ILYDxD3fxYehza/tw64PL68:q3Y
Malware Config
Extracted
oski
/103.114.107.28/l34/
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 664 set thread context of 2088 664 powershell.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2088 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 664 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 664 wrote to memory of 2088 664 powershell.exe 29 PID 2088 wrote to memory of 2636 2088 MSBuild.exe 30 PID 2088 wrote to memory of 2636 2088 MSBuild.exe 30 PID 2088 wrote to memory of 2636 2088 MSBuild.exe 30 PID 2088 wrote to memory of 2636 2088 MSBuild.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\dc7cce7fed750c48705f46022f2f9079.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 1123⤵
- Program crash
PID:2636
-
-