Resubmissions
06/04/2024, 10:11
240406-l8bfsafh7z 1006/04/2024, 10:11
240406-l774csge98 806/04/2024, 10:07
240406-l532mafh4x 806/04/2024, 10:03
240406-l3pq8age27 8Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
Oak-Grabber-V2-oakgrabber/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Oak-Grabber-V2-oakgrabber/builder.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Oak-Grabber-V2-oakgrabber/install python.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Oak-Grabber-V2-oakgrabber/oakv2.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Oak-Grabber-V2-oakgrabber/requirements.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Oak-Grabber-V2-oakgrabber/setup.bat
Resource
win10v2004-20240226-en
General
-
Target
Oak-Grabber-V2-oakgrabber/install python.bat
-
Size
878B
-
MD5
c38def437985f5a8bf0c2bfca5b4256d
-
SHA1
aee4ed8c80b3635864ebba27afed6527cfcba8c3
-
SHA256
855351b89743424c024807943d79c267b91992d0d4074811789817694d1c6a72
-
SHA512
a563213fcdf36b9e10b293c7ce3c553c47d87d3ead4c36cfcf0fb1968f91294e23f4e27010d481adc5b25fe733ad7b9c0214a76dbdd9383253609347c99a8fbd
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2712 powershell.exe -
Downloads MZ/PE file
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 powershell.exe 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1736 1096 cmd.exe 86 PID 1096 wrote to memory of 1736 1096 cmd.exe 86 PID 1736 wrote to memory of 2712 1736 cmd.exe 87 PID 1736 wrote to memory of 2712 1736 cmd.exe 87 PID 1096 wrote to memory of 3820 1096 cmd.exe 91 PID 1096 wrote to memory of 3820 1096 cmd.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oak-Grabber-V2-oakgrabber\install python.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
C:\Windows\system32\curl.execurl -LO https://www.python.org/ftp/python/3.10.9/python-3.10.9-amd64.exe2⤵PID:3820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82