Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 17:10

General

  • Target

    PO# HM00050746 13461-001,xls.xll

  • Size

    1.4MB

  • MD5

    a719b4a9d08553ff7683ddcb7003d68b

  • SHA1

    9039d4c0ed993549537bcf365fe35c553bd2ba50

  • SHA256

    fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

  • SHA512

    74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

  • SSDEEP

    24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:2856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 968
          4⤵
          • Program crash
          PID:1304
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2856 -ip 2856
    1⤵
      PID:4676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll

      Filesize

      155KB

      MD5

      e23a4eb5fdf390353653850b4e270e5a

      SHA1

      2453b05e25a3eb267bfbd0917dd5309fc835d54b

      SHA256

      0d15aa6ee2ae617307020aade63ee48c220b5dc8c89a0adbf194e240c97f84cc

      SHA512

      fc327d68bba8e66c32f91560a53f8a872d034c20b47049972a1b4d194fe0d36df03f36bce05f5aa2b224cecbcb26b03ff22310fc64b4d84a640f4dd337dd1149

    • C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll

      Filesize

      102KB

      MD5

      fa5262b04c1f7d6b162605b727dde5f4

      SHA1

      702bf033dbc688c8469be11fdbd893c48b75f589

      SHA256

      06de435e4cc8f9875a5c60af9b7ce6fa91d9708de3f740b17cfde6545a350555

      SHA512

      d3a85d52800d1b864ad9173bc82c40608f8b97aa4f15142548587b3faf72f3610368ac42d1ecaa390efd81aa28f3f025a1cceffd852131d56dd724c0717486db

    • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

      Filesize

      12KB

      MD5

      36cadc2fa9f7938f74061fda9b126a9f

      SHA1

      5252934ac46fb3bc8fdb361880ade043070501bd

      SHA256

      afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

      SHA512

      b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      237KB

      MD5

      e20191de5bd14daec71b86a3b0dc0322

      SHA1

      8c02025c9d90ad4217de3881ad587f33edf616ac

      SHA256

      be0aec244b6456cae2f67f188100aea1f7225d95a933e4ef108874947ff1355a

      SHA512

      31751a98912d7bc46bb4c9ae87256c569f5aa5fffc79a4f829a835a8f1a0bf7fbca8db7e3cff34e5363b5bf770d69f6fcc018879dae9605faeb9597675359e67

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      281KB

      MD5

      79a2a79f2dd953f68c462e964a27ab9a

      SHA1

      b0065abaef7509cbd37f1533175af81ef4dd7e23

      SHA256

      4e08613ceb59f9c9aa3fdb0e20e322074239c0174c553405990698104c4ed98b

      SHA512

      28fd9305d6ac9de44b6e55acb4b23a8a85ebeb3b922b1baea0b578c3abe545e29d0dc84b16787cc95629247649d785e7e4e20ab74e181b3ef0de03ebd376f886

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      98KB

      MD5

      2c39cea4f78e199c7bd63ca4418b6c64

      SHA1

      d34f3734c6b38608ad15432e0bc6bb6b616cbf47

      SHA256

      9bbaecd11a9b35e9421f471f121a688d39404368e1922f9db9b2728ff37fad43

      SHA512

      455a89c6dc4f146f634b3ef94c9a94af894d723ee5ac154da18f7752378c6dab602b83849420098d52202d52ac3dd9c82451b594189c5dcf88a168a1334c5196

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      996KB

      MD5

      fd488d558cce533dbdd6dd407ef1fd32

      SHA1

      bc57c81ad80d65fca56edde78cbf9db7ed53beb3

      SHA256

      2c37d0e68dc954c03b941ba7cd3188993bba2a5867093b8905c696f811e93914

      SHA512

      d14c80f803714ef9fb0b6e9169735ba30b6371e217d24bfdfc325c0058e5c470a82b652706f65ba733074fecc9471b35023fa7ad57e727b19554012da2c825f8

    • memory/64-25-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-30-0x0000022AC8950000-0x0000022AC8960000-memory.dmp

      Filesize

      64KB

    • memory/64-9-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-10-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-12-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-11-0x00007FFEA9980000-0x00007FFEA9990000-memory.dmp

      Filesize

      64KB

    • memory/64-13-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-14-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-15-0x00007FFEA9980000-0x00007FFEA9990000-memory.dmp

      Filesize

      64KB

    • memory/64-17-0x0000022AC8780000-0x0000022AC88FC000-memory.dmp

      Filesize

      1.5MB

    • memory/64-7-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-6-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-20-0x0000022AC8970000-0x0000022AC898C000-memory.dmp

      Filesize

      112KB

    • memory/64-21-0x0000022AE4FB0000-0x0000022AE4FEC000-memory.dmp

      Filesize

      240KB

    • memory/64-23-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-22-0x00007FFEC3870000-0x00007FFEC4331000-memory.dmp

      Filesize

      10.8MB

    • memory/64-28-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-27-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-26-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-1-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-24-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-29-0x0000022AE5030000-0x0000022AE5134000-memory.dmp

      Filesize

      1.0MB

    • memory/64-5-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-8-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-3-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-4-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-2-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-0-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-128-0x00007FFEC3870000-0x00007FFEC4331000-memory.dmp

      Filesize

      10.8MB

    • memory/64-127-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-125-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-126-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-124-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-123-0x00007FFEABCD0000-0x00007FFEABCE0000-memory.dmp

      Filesize

      64KB

    • memory/64-90-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-84-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-85-0x00007FFEEBC50000-0x00007FFEEBE45000-memory.dmp

      Filesize

      2.0MB

    • memory/64-86-0x00007FFEC3870000-0x00007FFEC4331000-memory.dmp

      Filesize

      10.8MB

    • memory/64-87-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-88-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-89-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-91-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/64-92-0x0000022AE4FA0000-0x0000022AE4FB0000-memory.dmp

      Filesize

      64KB

    • memory/2856-107-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2856-103-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2856-101-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2856-99-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2856-97-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4380-71-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4380-96-0x00000000066B0000-0x00000000066E8000-memory.dmp

      Filesize

      224KB

    • memory/4380-95-0x00000000065B0000-0x0000000006650000-memory.dmp

      Filesize

      640KB

    • memory/4380-94-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/4380-102-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4380-93-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4380-78-0x0000000005A60000-0x0000000005A7A000-memory.dmp

      Filesize

      104KB

    • memory/4380-77-0x0000000004A30000-0x0000000004A3A000-memory.dmp

      Filesize

      40KB

    • memory/4380-76-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/4380-75-0x0000000004AF0000-0x0000000004B8C000-memory.dmp

      Filesize

      624KB

    • memory/4380-74-0x0000000004A50000-0x0000000004AE2000-memory.dmp

      Filesize

      584KB

    • memory/4380-73-0x0000000004F60000-0x0000000005504000-memory.dmp

      Filesize

      5.6MB

    • memory/4380-72-0x0000000000030000-0x0000000000130000-memory.dmp

      Filesize

      1024KB