Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 07:25

General

  • Target

    e11c3b1cc868bcac2b10f1e7739b2501.exe

  • Size

    381KB

  • MD5

    e11c3b1cc868bcac2b10f1e7739b2501

  • SHA1

    9ac339112cc6fd56efa6026953004bb75bd76cc0

  • SHA256

    ead4fbb41f9237091a53a9c5be2b50c222f3a7fce542bc6bab7acd302405c508

  • SHA512

    27b2d7981856a39b598306725e6701e001a26149e0a7b28229ff0893ca21e17581907ed416c261a73cc31653f498f9e5e2a901f757c62ec80b0ee32ad43a87ea

  • SSDEEP

    6144:d2VEppbDxzjl1+FEIHWknFDKYuzBXmrp22NHdsIfR6tbrIp40A4Dh:5pp31CFEIHbFWYEcrffsIfkbrQ4pyh

Malware Config

Extracted

Family

oski

C2

kiwipl.com

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e11c3b1cc868bcac2b10f1e7739b2501.exe
    "C:\Users\Admin\AppData\Local\Temp\e11c3b1cc868bcac2b10f1e7739b2501.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\miore.exe
      "C:\Users\Admin\AppData\Local\Temp\miore.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\lioc.exe
      "C:\Users\Admin\AppData\Local\Temp\lioc.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1412
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\msvcp140.dll

    Filesize

    153B

    MD5

    d9e4660829c2f1d3aeece0700a737d21

    SHA1

    208af3a0734482cb5b70e62148878da995bc12df

    SHA256

    c649b72d40b182375b97337744d6ed80b886d0a4cce87fe9f3b7bd7ebef7f6de

    SHA512

    c93272e68a3dd02e5136b4a60c6a5a31ac8f3c3733228627da0526b0c6bdbd91ff0c16c20e1e26380e3853a7235a39b4147ead44733044dc291087d064b654dd

  • \Users\Admin\AppData\Local\Temp\lioc.exe

    Filesize

    200KB

    MD5

    631baafff18a2c46a0ddddb6cd4db7dd

    SHA1

    e4268660608735cdc166c97432e03c4f5de0f7c1

    SHA256

    c740ab68c89323420fc94e5b2f7be88958ad33c1d0ae70c9a28088e576cee2e4

    SHA512

    153be28e1ad161cbc1c5dcf9058f12608d7bb11338c9fae7e12aadf22bcbe8206d182a018cc5c3db8483c3ee9ba055c156ebdbcb84da968a351141afa044d3ae

  • \Users\Admin\AppData\Local\Temp\miore.exe

    Filesize

    109KB

    MD5

    0e5c12df26f858b2d4e6741917a4cd1b

    SHA1

    b81171ecac330f1179012c16dae56b1de81b56e7

    SHA256

    5e51ec3a5ff289f2b0db602b4dd4b987db17bda4964a8b1caa44d9e6bcf4355e

    SHA512

    e48c55f8c04de46d89db96d0068728fa27bd9768a3b8dc189d6adff694fcc35fd42291fd60655020df50c5ba4404198f0d0115c4c2e007b35c696204a1da5910

  • memory/2184-3-0x00000000002B0000-0x00000000002D1000-memory.dmp

    Filesize

    132KB

  • memory/2184-4-0x0000000000400000-0x0000000000916000-memory.dmp

    Filesize

    5.1MB

  • memory/2184-33-0x0000000000400000-0x0000000000916000-memory.dmp

    Filesize

    5.1MB

  • memory/2184-2-0x00000000009A0000-0x0000000000AA0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-35-0x00000000001C0000-0x00000000001E2000-memory.dmp

    Filesize

    136KB

  • memory/2200-37-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/2200-41-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/2200-36-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-67-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-68-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB