Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 14:24
Behavioral task
behavioral1
Sample
projectoyster.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
projectoyster.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
cstealer.pyc
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
cstealer.pyc
Resource
win10v2004-20240508-en
General
-
Target
projectoyster.exe
-
Size
17.6MB
-
MD5
c2f6ec069ca587f732ee9107d9541ff4
-
SHA1
10a8985cc2f249ce143f97b26471426a95625ba2
-
SHA256
7fe09e5889787ae38ef8f5242811a60ebe1526314eb08cc184b7e47051815e2b
-
SHA512
b8c07ca5ece52fd6acc9a43d88216e6b57c0af908027099f0e2d3e48fcd19cbf4bde266c0cd3414233d0df2b7314fe801b12ee72804b31c5a7467f769f21e4d2
-
SSDEEP
393216:V5RM0d0EpEk/+4u8mwW+eGQRJ9jo7BGIGg3zOY:hMoDp3+RBwW+e5RJ9MnOY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ projectoyster.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ projectoyster.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion projectoyster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion projectoyster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion projectoyster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion projectoyster.exe -
Loads dropped DLL 7 IoCs
pid Process 2904 projectoyster.exe 2904 projectoyster.exe 2904 projectoyster.exe 2904 projectoyster.exe 2904 projectoyster.exe 2904 projectoyster.exe 2904 projectoyster.exe -
resource yara_rule behavioral1/memory/2916-0-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2916-2-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2916-3-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2916-4-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2904-118-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2904-119-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2904-116-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2916-135-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2904-136-0x0000000140000000-0x00000001409BE000-memory.dmp themida behavioral1/memory/2916-243-0x0000000140000000-0x00000001409BE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA projectoyster.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA projectoyster.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2916 projectoyster.exe 2904 projectoyster.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2904 2916 projectoyster.exe 28 PID 2916 wrote to memory of 2904 2916 projectoyster.exe 28 PID 2916 wrote to memory of 2904 2916 projectoyster.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\projectoyster.exe"C:\Users\Admin\AppData\Local\Temp\projectoyster.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\projectoyster.exe"C:\Users\Admin\AppData\Local\Temp\projectoyster.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5ed5be31d94e10df1af37fad4604770b5
SHA1f6458eb3f290bbfa9a5f24e1754fb07a654885f6
SHA256946d6143572774b4fa69804637064bfc209e06b43859d48ab4b001d7615eaae4
SHA512f107a089b96ae0b62ed76b0b8d5be77a5756837859c4d31199a172fc3bc64de7bc2053175948af6c9e779af0a2483911627beaa9ed079526db2fa19292f986b0
-
Filesize
22KB
MD50bac0d006e4fcc5aee4119fa4b52197a
SHA1a6f1b4c9652ac92ba56e28bfe8877a3000d892ba
SHA2560d290cf027a69595ec492a6a31bdc8d3743b75af8d3e2977852ee795730110ab
SHA5126f5f1b891cde12c378f9c540497631f6187ec62da9d332774edfa42dcc7202b0d490e2965a24038099607f91cf6f8b4b72e41a087d0766d5177817cbe9cf4cfa
-
Filesize
22KB
MD550427f5c7ff2fd7498ffc1448ebbb842
SHA165273390f7a29293bab562f0960459889bb934ba
SHA256583cf4c4303ed783ed295595d0dd2ae0ca6ca7927e9221dd0fb705aa5d0ee866
SHA5127f6e5ff3e9486363fd57c6ad3e6bc37a4f5f6d579eef02725a83c210c0e4782ab1499d049fd288dae312724c1a509a48f0fc9c19ebb66bed6c7e3f588f817439
-
Filesize
6.6MB
MD55c5602cda7ab8418420f223366fff5db
SHA152f81ee0aef9b6906f7751fd2bbd4953e3f3b798
SHA256e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce
SHA51251c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f
-
Filesize
1.1MB
MD5515421ddfb75fd1cd224edb6d765abb0
SHA19343f37828b2cf8f83b246e59681e635950c02d9
SHA2561617fcbcf7da6373c49ea27075e879a06a05eaa2d523fc035aabb7daaeab7f27
SHA512b7a3162a3473b668d26df1d4d28ceb12de61b671b05bacb42dfb45a17127698ed22281d244d2c13b232396dc01f1bf6d39d007b207444aed5fd3e0a45b813ca3
-
Filesize
22KB
MD520bf471cb827deb38c05541295a34318
SHA14410909bc6fa6e88c30ee08f5fb03ea03afab22a
SHA25657b447577c0dfbad077ff8439f4e3f00269824b2436bd2b3b228aa02e55f29f6
SHA5125ec0e8612cdc4add68dad1c202adc190795e87c7c3e38d0a3ae25571c6a4f0bd47403e6f7f2f5f1c9fcaf30751226394a3265a4aa76d91f027a7c8e26d78e3aa
-
Filesize
22KB
MD5e5f624217aa3580fdd5e7873ea89ccc1
SHA15e32aea2cea67dbda98b635068a93a4e6665fbb9
SHA256fc1636ec583b9444580d9037bc3120702abffef0d5c67390363e50ec6ea87d86
SHA5123f4a237bf3fe4b3762acc99b3154426ce53e6de2ed46ed54ccfa0aeef2ec16b46b4f6491c166a5bb4ea1f52a29373d0448d141f48894aa7171da869056197aa3