Overview
overview
10Static
static
3OASIS AIO TOOL.rar
windows7-x64
1OASIS AIO TOOL.rar
windows10-2004-x64
1AdbWinApi.dll
windows7-x64
3AdbWinApi.dll
windows10-2004-x64
3OASIS AIO ...pi.dll
windows7-x64
3OASIS AIO ...pi.dll
windows10-2004-x64
3OASIS AIO ...OL.exe
windows7-x64
4OASIS AIO ...OL.exe
windows10-2004-x64
4OASIS AIO ...db.exe
windows7-x64
10OASIS AIO ...db.exe
windows10-2004-x64
10SHREDDER AIO TOOL.exe
windows7-x64
4SHREDDER AIO TOOL.exe
windows10-2004-x64
4adb.exe
windows7-x64
3adb.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/12/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
OASIS AIO TOOL.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OASIS AIO TOOL.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AdbWinApi.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
OASIS AIO TOOL/AdbWinApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
OASIS AIO TOOL/AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OASIS AIO TOOL/SHREDDER AIO TOOL.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OASIS AIO TOOL/SHREDDER AIO TOOL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OASIS AIO TOOL/adb.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
OASIS AIO TOOL/adb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
SHREDDER AIO TOOL.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
SHREDDER AIO TOOL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
adb.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
adb.exe
Resource
win10v2004-20241007-en
General
-
Target
OASIS AIO TOOL/AdbWinApi.dll
-
Size
108KB
-
MD5
0c9fe1d2b6adf8bced775447a4f19545
-
SHA1
54c50cc56f5e8a9bb89055d3336295a9d0df9e12
-
SHA256
16ab72834348dd981bc4f18d6c0e1d55e7e6d94d620323b82ea6872c147adacf
-
SHA512
f13316a0b978ed53076f95c9bdae7eb63e33d0123ecdc1486afef3105c79be0d0889830997609189a85281f38a8b3cf2e7a8f7251cc36558457182c8f9750dfb
-
SSDEEP
1536:TLpCxybY0FS6MqS6WvgD9xj03TabrFvY5J6sCGt8xed3Ufm:/po0k6ZWVTaif6sCGiS9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4412 4584 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4584 4876 rundll32.exe 83 PID 4876 wrote to memory of 4584 4876 rundll32.exe 83 PID 4876 wrote to memory of 4584 4876 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 6163⤵
- Program crash
PID:4412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4584 -ip 45841⤵PID:4844