Analysis

  • max time kernel
    101s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 23:26

General

  • Target

    PO# HM00050746 13461-001,xls.xll

  • Size

    1.4MB

  • MD5

    a719b4a9d08553ff7683ddcb7003d68b

  • SHA1

    9039d4c0ed993549537bcf365fe35c553bd2ba50

  • SHA256

    fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

  • SHA512

    74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

  • SSDEEP

    24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:4196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1316
          4⤵
          • Program crash
          PID:4576
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4196 -ip 4196
    1⤵
      PID:3444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll

      Filesize

      336KB

      MD5

      244fd2c9b0b9362f88dbfd29e1cbd546

      SHA1

      21f4b88c0aa75773c0c64f0254cb5cf905b09226

      SHA256

      75a9c86c578546f16f15f16b66b1d83cf7cd6a8e3c412b7fe534d932734d1ef0

      SHA512

      9cc25fc29958b62478e133670de89838bde26125f688e16fe360bf177f00b3c0ac675c927311380f3d55990fb9064e00f06df8296dc30554568d35b657108ead

    • C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll

      Filesize

      374KB

      MD5

      d507e2a05934b837a53bc56c66ea9b88

      SHA1

      4883564b19d00903ac4b8784279335fc13f2b36e

      SHA256

      6fc1fc59e518c2fcba9f8ea56c69155116ffbcda9a7927eaec96be0d515d95ed

      SHA512

      46fa75809f414f7c9173e1503532af8b1916e45027f943a6b6907d4fc71d86310bacabb2e328bba51d9ad09b49fdc1ac08fcb3531b22d01bee4f3605fe0cd2ee

    • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

      Filesize

      12KB

      MD5

      36cadc2fa9f7938f74061fda9b126a9f

      SHA1

      5252934ac46fb3bc8fdb361880ade043070501bd

      SHA256

      afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

      SHA512

      b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      735KB

      MD5

      eae1a88868c72b18ea95a3a78debd7b6

      SHA1

      433be2335042c24c721be837bf653f900a4d732a

      SHA256

      180874c0bd8acc8d816f4fef6baf72baa56673ea924b3e73d5b590a8857c4bdf

      SHA512

      669309d82b5d8e6823b0d596907ceecb01a78ffad5c6ccdac0d8bd9f7f679b429ccbd08341ab1f40079e1c4887bcaeb7fc377c4709400257de31951ae7fa2bad

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      241KB

      MD5

      499fc8aab8c0c41790580296eaade840

      SHA1

      84b270684d1cb5631786b01f9ba3b8a86ce8b396

      SHA256

      5578dee61f8a1b550a6c6a450e4d6acc522c33e8bed1b077c96389c608e7809f

      SHA512

      ee4319c610fa21a9ea67ee55a6957fb3ec89f3ee3364a4da96f95c14fcc153b730d4c5bac6837cef4ecfe56c7feed9cc71ce60c3b4f279ce0b736c41802f652d

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      257KB

      MD5

      3cfe0f19db983f4e9f6c5413d35eda09

      SHA1

      059dea29ead2f3af034740520d6520f81f4d58c4

      SHA256

      4145ce5f063208ff7bc7518b75a79060dda3af0b3e71b06fc5a7b4b0dfc37e2f

      SHA512

      51592785b7f8bcf2d075a81cdab3240bc6b6ca80b001d08b77ed12837cb7d450515d8fbd36fdeb993fa142b2c8ff9b41deff1c31c706e4e5f355648c62154b7a

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      319KB

      MD5

      d1de2bcfece34d4297f8ba32259e2b84

      SHA1

      cb5b8736bdf405b2ae6dc3a719b5b5264ef68340

      SHA256

      fff8856f94cdf92a4d3bee7defdb04be9e31340ddd6c2a6434005ffcfd899e72

      SHA512

      ece542a256b9ce3148bd45003c65952f772e6f631739b87c0ab9a64c30f30935dce42c6d9aa5e23e137e20a21f61615724eb81ca9ed5b51ce42914b5b4ec1ced

    • memory/2136-19-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-3-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-10-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-9-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-11-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-13-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-12-0x00007FF8A65C0000-0x00007FF8A65D0000-memory.dmp

      Filesize

      64KB

    • memory/2136-14-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-15-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-16-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-17-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-1-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-20-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-133-0x00007FF8BFF90000-0x00007FF8C0A51000-memory.dmp

      Filesize

      10.8MB

    • memory/2136-8-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-23-0x000001A51FCF0000-0x000001A51FE6C000-memory.dmp

      Filesize

      1.5MB

    • memory/2136-6-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-26-0x000001A5215A0000-0x000001A5215BC000-memory.dmp

      Filesize

      112KB

    • memory/2136-28-0x000001A5396E0000-0x000001A53971C000-memory.dmp

      Filesize

      240KB

    • memory/2136-31-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-36-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-35-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-34-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-33-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-32-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-30-0x00007FF8BFF90000-0x00007FF8C0A51000-memory.dmp

      Filesize

      10.8MB

    • memory/2136-40-0x000001A539760000-0x000001A539864000-memory.dmp

      Filesize

      1.0MB

    • memory/2136-41-0x000001A5213E0000-0x000001A5213F0000-memory.dmp

      Filesize

      64KB

    • memory/2136-7-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-4-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-132-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-2-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-131-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-18-0x00007FF8A65C0000-0x00007FF8A65D0000-memory.dmp

      Filesize

      64KB

    • memory/2136-5-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-130-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-129-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-128-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-0-0x00007FF8A89B0000-0x00007FF8A89C0000-memory.dmp

      Filesize

      64KB

    • memory/2136-97-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-86-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-87-0x00007FF8E8930000-0x00007FF8E8B25000-memory.dmp

      Filesize

      2.0MB

    • memory/2136-88-0x00007FF8BFF90000-0x00007FF8C0A51000-memory.dmp

      Filesize

      10.8MB

    • memory/2136-89-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-93-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-95-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-94-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/2136-96-0x000001A539860000-0x000001A539870000-memory.dmp

      Filesize

      64KB

    • memory/4196-102-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4196-108-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4196-111-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4196-106-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4196-105-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/5060-78-0x0000000005FE0000-0x0000000006584000-memory.dmp

      Filesize

      5.6MB

    • memory/5060-82-0x0000000005A90000-0x0000000005A9A000-memory.dmp

      Filesize

      40KB

    • memory/5060-98-0x00000000743C0000-0x0000000074B70000-memory.dmp

      Filesize

      7.7MB

    • memory/5060-83-0x00000000072B0000-0x00000000072CA000-memory.dmp

      Filesize

      104KB

    • memory/5060-101-0x0000000009C00000-0x0000000009C38000-memory.dmp

      Filesize

      224KB

    • memory/5060-100-0x0000000007550000-0x00000000075F0000-memory.dmp

      Filesize

      640KB

    • memory/5060-99-0x0000000005D90000-0x0000000005DA0000-memory.dmp

      Filesize

      64KB

    • memory/5060-77-0x00000000743C0000-0x0000000074B70000-memory.dmp

      Filesize

      7.7MB

    • memory/5060-80-0x0000000005B70000-0x0000000005C0C000-memory.dmp

      Filesize

      624KB

    • memory/5060-76-0x0000000000FA0000-0x00000000010A0000-memory.dmp

      Filesize

      1024KB

    • memory/5060-81-0x0000000005D90000-0x0000000005DA0000-memory.dmp

      Filesize

      64KB

    • memory/5060-79-0x0000000005AD0000-0x0000000005B62000-memory.dmp

      Filesize

      584KB

    • memory/5060-107-0x00000000743C0000-0x0000000074B70000-memory.dmp

      Filesize

      7.7MB