Analysis

  • max time kernel
    150s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 14:15

General

  • Target

    4e849d1441cd9db1675e9259e0233552.xll

  • Size

    1.4MB

  • MD5

    4e849d1441cd9db1675e9259e0233552

  • SHA1

    05d51a132a5cc55bf5dc1b0c3c71583d09b41928

  • SHA256

    6f7e9f7592b5f984d3c6a7233f5f3b483593aa1dc1e9aea19d1477f2214fe48c

  • SHA512

    b4f820f1c74eb7bc6aee81be798d5127eae1e862329c52af6f089f3ce4a463c524b611963e943a598cd14f269afca508fb46331efef9ec054f75a41e7cf8afdc

  • SSDEEP

    24576:WzbGHAzHAjX1zcLgoFifXiBiRXInRzxgqaqfR3hxjkY9bFX:WziHIFEMIyKEzKqaqfR3b5H

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

irkark.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4e849d1441cd9db1675e9259e0233552.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:3204
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:4056
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:1248
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:3044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1292
          4⤵
          • Program crash
          PID:2152
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3044 -ip 3044
    1⤵
      PID:4384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4e849d1441cd9db1675e9259e0233552.xll

      Filesize

      1.4MB

      MD5

      4e849d1441cd9db1675e9259e0233552

      SHA1

      05d51a132a5cc55bf5dc1b0c3c71583d09b41928

      SHA256

      6f7e9f7592b5f984d3c6a7233f5f3b483593aa1dc1e9aea19d1477f2214fe48c

      SHA512

      b4f820f1c74eb7bc6aee81be798d5127eae1e862329c52af6f089f3ce4a463c524b611963e943a598cd14f269afca508fb46331efef9ec054f75a41e7cf8afdc

    • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

      Filesize

      12KB

      MD5

      36cadc2fa9f7938f74061fda9b126a9f

      SHA1

      5252934ac46fb3bc8fdb361880ade043070501bd

      SHA256

      afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

      SHA512

      b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      623KB

      MD5

      cf4f321402dc62a3314e2d5c345f9c15

      SHA1

      24846f88e80ce62b305ed27db760020bb51b4276

      SHA256

      44a537a3460a292723834b0b4d086f862de101216f133034f452167cf0ffa413

      SHA512

      3fac8d39611526a1dfb25228730fa36ad793790928d76446f2758909a48ffa9a130f84cdc564266ee3dad712676fe6b65af968c79d7fc75f194f5f8fc674fe67

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      453KB

      MD5

      9015f1e0832d6fb1355f5780cd3ab101

      SHA1

      7722d53600a3c291e844bcd851a2ade7eca98a22

      SHA256

      60cee250c1d0c6fa3bafb10f1f0e2f3cc8a521e52a699696d0e876fb283bcce4

      SHA512

      4343738ae7c5c3e2f3eea271b0c695911e37a494021d140fdd350eb2f03229625eb3496afc344913dc80c3cf15a643c89f3b8ca630372fa5d1662dcd3b5e92fa

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      650KB

      MD5

      6ce4a5fa446916b4f3347fe109084902

      SHA1

      8410237a3e9ce9ca517802318e4f752e7b3706ff

      SHA256

      746cb1868df3552574b154617863391c2a1ebf26925c7c0b8dc117cded6182e0

      SHA512

      78cd6f60b2e801340b4096c40ab50885e3cc7f47f9523c87f664366fee7c55b4157335b97712aea326301a9cee6c220dd734598f3b96dcd495f300938d64db1b

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      960KB

      MD5

      341d5821cd6f361422eacc710759e3b7

      SHA1

      2987678ceb1e1494c81f3594c09c5b2e74a7f27d

      SHA256

      1709c88e2169e1d2dc7148ec02516ad0de44d7e7a74e846dccfd444152606d3a

      SHA512

      a6f06cd2624e76d49787f8fab7b3a3fa8a61aa920c99346b0348a2fd83a84f07ec7c421e1a1da40b39c69024b61cf86034a113837c72e9624342677692361c91

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      192KB

      MD5

      b27339f72ada889993033ed21a396f2e

      SHA1

      3eb93d64de91c9fa30c4836c8c16bf37ddcb0037

      SHA256

      10d84e8a38e5947fed24c1d188237d5cdea568e0ee0f4942d92f706a4242ad5d

      SHA512

      efe73311c6328f09c185e4bb73110e3c215f32f410e38780640b2feca2e01f010e520c7097859b84e476ac03a08c8fd6e9ff03caf245cb6bab18eb376b75a126

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      133KB

      MD5

      39b80a52c0d2b0033ead69737167b226

      SHA1

      330817f27ec03e1ba7a5a20199bc0b5437c2690f

      SHA256

      6df2194819910da49f97706ae7937679e4105aa81a8c054f041dac5026c81699

      SHA512

      74eb0f0651567f7f8d08736ce4ace281176ef45e3089941648cee6685aba4cdedc858bd8d26c2e717b654024cd5d16b43425f6315250e01c5c8e779adcbf352a

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      64KB

      MD5

      6ea2a95032467504c33d38a71d3783f9

      SHA1

      d985434ff5ec6517d817c4dd781d6e23041c0972

      SHA256

      da717d1fe1aefc156a85134f1a064a0d140004cf4fcfbbd0e9a09ad30186d782

      SHA512

      721a4bd16b55d2df2ab159e1feb6d1a84e79c0091755f3b02e30cc3c6aa7306c54150b8f29d5f4434fd810e0625e70eea2455d192ad92adcb3cc4e5c31a2267c

    • memory/1988-87-0x0000000006DF0000-0x0000000006E92000-memory.dmp

      Filesize

      648KB

    • memory/1988-70-0x0000000005430000-0x0000000005440000-memory.dmp

      Filesize

      64KB

    • memory/1988-66-0x0000000000820000-0x0000000000924000-memory.dmp

      Filesize

      1.0MB

    • memory/1988-67-0x00000000057B0000-0x0000000005D54000-memory.dmp

      Filesize

      5.6MB

    • memory/1988-68-0x0000000005300000-0x0000000005392000-memory.dmp

      Filesize

      584KB

    • memory/1988-69-0x0000000005440000-0x00000000054DC000-memory.dmp

      Filesize

      624KB

    • memory/1988-99-0x0000000075360000-0x0000000075B10000-memory.dmp

      Filesize

      7.7MB

    • memory/1988-65-0x0000000075360000-0x0000000075B10000-memory.dmp

      Filesize

      7.7MB

    • memory/1988-88-0x0000000009460000-0x0000000009498000-memory.dmp

      Filesize

      224KB

    • memory/1988-86-0x0000000005430000-0x0000000005440000-memory.dmp

      Filesize

      64KB

    • memory/1988-85-0x0000000075360000-0x0000000075B10000-memory.dmp

      Filesize

      7.7MB

    • memory/1988-72-0x0000000006160000-0x000000000617A000-memory.dmp

      Filesize

      104KB

    • memory/1988-71-0x00000000053C0000-0x00000000053CA000-memory.dmp

      Filesize

      40KB

    • memory/3044-95-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3044-98-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3044-100-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3044-101-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3044-106-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4448-74-0x00007FFC98520000-0x00007FFC98FE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-0-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-6-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-7-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-8-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-30-0x000002FEB0700000-0x000002FEB0710000-memory.dmp

      Filesize

      64KB

    • memory/4448-29-0x000002FEB07E0000-0x000002FEB08E8000-memory.dmp

      Filesize

      1.0MB

    • memory/4448-28-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-73-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-10-0x00007FFC7F6D0000-0x00007FFC7F6E0000-memory.dmp

      Filesize

      64KB

    • memory/4448-80-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-81-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-82-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-83-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-84-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-27-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-26-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-4-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-24-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-5-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-3-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-25-0x000002FEB2030000-0x000002FEB2040000-memory.dmp

      Filesize

      64KB

    • memory/4448-2-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-1-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-23-0x00007FFC98520000-0x00007FFC98FE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-22-0x000002FEB0760000-0x000002FEB079C000-memory.dmp

      Filesize

      240KB

    • memory/4448-21-0x000002FEB0730000-0x000002FEB074C000-memory.dmp

      Filesize

      112KB

    • memory/4448-9-0x00007FFC7F6D0000-0x00007FFC7F6E0000-memory.dmp

      Filesize

      64KB

    • memory/4448-13-0x000002FEAD7F0000-0x000002FEAD971000-memory.dmp

      Filesize

      1.5MB

    • memory/4448-118-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-119-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-120-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-121-0x00007FFC81A50000-0x00007FFC81A60000-memory.dmp

      Filesize

      64KB

    • memory/4448-122-0x00007FFCC19D0000-0x00007FFCC1BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4448-123-0x00007FFC98520000-0x00007FFC98FE1000-memory.dmp

      Filesize

      10.8MB