Analysis

  • max time kernel
    101s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 04:10

General

  • Target

    8b5c6a2b226e7c6ba532e8448d6bfc82.xll

  • Size

    1.4MB

  • MD5

    8b5c6a2b226e7c6ba532e8448d6bfc82

  • SHA1

    723acb3cba81639e58e0041da83f2db58077cedf

  • SHA256

    2a71fdd923c2c1cf13ffee31c74aed4a464ff0c97cf9a6c42a788d4fdcec3efd

  • SHA512

    3f994a7f1edbd35f5c0d66868a5ba848d501849f185012cfe86224f1be5fa03efd1dfea8494d270cd8a08f03a07f90d9ae990fabb88964a510b208227ab1b997

  • SSDEEP

    24576:WzbGHAzHAjX18cLgGglNv9lyttyCKiCtXNs4sHqQDmMmkZ5TQ1oj5+QPybODrB++:WziHIaEG+strCPsDFp/6e98OM

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

irkark.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8b5c6a2b226e7c6ba532e8448d6bfc82.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:4424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1296
          4⤵
          • Program crash
          PID:2828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 4424
    1⤵
      PID:4900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8b5c6a2b226e7c6ba532e8448d6bfc82.xll

      Filesize

      307KB

      MD5

      345b8d7aa36df23d6c4dfe9d5370094a

      SHA1

      062fb3a7d39b075aa0c5a8cc6030b66abf1482d8

      SHA256

      22e5a766719465fbd40fc4f93f5d0e56a8d398977ab4b194d25f3b0f7adf2ee6

      SHA512

      4e6ff30f380a7b7769aa6de7a275bcc2d56002b8b229178f60604bcf9f1897e6e1679d159cb32ef58a37e03f7d8335d45a2a156654cd4f07e0d3eb56f5f325d6

    • C:\Users\Admin\AppData\Local\Temp\8b5c6a2b226e7c6ba532e8448d6bfc82.xll

      Filesize

      221KB

      MD5

      172f0c0ec30e78bdbf1d4dc91aa3ebb3

      SHA1

      b2c3a4e8c15105eb8bfe7872db07866a1207b5e4

      SHA256

      c4a6e41d81f4e49533b28abcc7e167468a5c232fc1d88de4418e3a5a165d086c

      SHA512

      a2eb29fe3580d7fd275a509c6926ca0ba4f1c1b504362f6d777635aca539e705319dbcba016daf2dd162b006835b9a2fae52bfed4657e15c5c55ec238e39d1b4

    • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

      Filesize

      12KB

      MD5

      36cadc2fa9f7938f74061fda9b126a9f

      SHA1

      5252934ac46fb3bc8fdb361880ade043070501bd

      SHA256

      afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

      SHA512

      b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      1016KB

      MD5

      1f3f0df96f20b886328d79074944067d

      SHA1

      93658ff5de14681b09439fe94e272f4f329e3a8a

      SHA256

      51855bf07f8dbe24ca6f11c6dc9bd4e8c27bed93159f96afdb448cce7bf7d515

      SHA512

      61ebb3d18e21702bad5ece5701e019322ac4a44b5c1b5be4ca54fb9d7f89a4b2c9541fe7fa49fbb0f61d74751eeaca15302190233dc8d1e5ed50c958789d1b0b

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      109KB

      MD5

      e10c90d48b3d65b000327e40c3dfe163

      SHA1

      d787616a818cf49ff4afbe316bac8df1cab54c63

      SHA256

      9f2adb431adc11dfa304e65a7cdb6a036a635137fa253db862811f48599c7569

      SHA512

      bd2a4d597815ba1ec18b94b24473cf9d157632f68e5129d6ff7bf1a2980fdf33d36b2fc6ec1cc63b162b31344670c88fa6225e62374771155673fda385665886

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      68KB

      MD5

      ed0e37844462bf5276fce30896c37b5a

      SHA1

      29c6a8f08a5ab5abbcc5f69fe69a02dbcc8bf38c

      SHA256

      3d844adb11b19c5d7324f0f50f1d8c06adbec9bd34d7bcc886dcdeb288bfe051

      SHA512

      bb536c8e800bd6815d492f852a21b6b555111180c0936f805dd3193df88246f867e5f9e040a8bff0284ec18638edf34efb6a485a7efe48dc3274dc23d20da188

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      94KB

      MD5

      39677c1fe5c7db242e8012361dbc443e

      SHA1

      b94af77671343fa08e8c624713e830ed9d4e597f

      SHA256

      1561b667cb948226e5c2606dd0990d6fb64c8247cfe39012e4e6907db9ff870e

      SHA512

      472a70c30556a0338aab7e5dd86ffe0d5cb5ae35af11fc50cbbb383fc215acde6b332981bd3085def9204f5d56279bcaeec27c330f9a838c671b1f3c05aeee0e

    • memory/4236-27-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-25-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-13-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-14-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-16-0x00007FFEE65B0000-0x00007FFEE65C0000-memory.dmp

      Filesize

      64KB

    • memory/4236-15-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-11-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-4-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-3-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-2-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-19-0x000001890E230000-0x000001890E3B1000-memory.dmp

      Filesize

      1.5MB

    • memory/4236-10-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-8-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-22-0x000001890E590000-0x000001890E5AC000-memory.dmp

      Filesize

      112KB

    • memory/4236-23-0x000001890E6B0000-0x000001890E6EC000-memory.dmp

      Filesize

      240KB

    • memory/4236-24-0x00007FFF00B90000-0x00007FFF01651000-memory.dmp

      Filesize

      10.8MB

    • memory/4236-26-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-92-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-29-0x0000018928F40000-0x0000018929048000-memory.dmp

      Filesize

      1.0MB

    • memory/4236-28-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-30-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-12-0x00007FFEE65B0000-0x00007FFEE65C0000-memory.dmp

      Filesize

      64KB

    • memory/4236-31-0x000001890E6F0000-0x000001890E700000-memory.dmp

      Filesize

      64KB

    • memory/4236-9-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-7-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-5-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-6-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-0-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-128-0x00007FFF00B90000-0x00007FFF01651000-memory.dmp

      Filesize

      10.8MB

    • memory/4236-127-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-126-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-125-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-124-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-123-0x00007FFEE8F10000-0x00007FFEE8F20000-memory.dmp

      Filesize

      64KB

    • memory/4236-1-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-84-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-85-0x00007FFF28E90000-0x00007FFF29085000-memory.dmp

      Filesize

      2.0MB

    • memory/4236-86-0x00007FFF00B90000-0x00007FFF01651000-memory.dmp

      Filesize

      10.8MB

    • memory/4236-91-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-90-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-89-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-88-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4236-87-0x0000018927E50000-0x0000018927E60000-memory.dmp

      Filesize

      64KB

    • memory/4244-72-0x0000000074C70000-0x0000000075420000-memory.dmp

      Filesize

      7.7MB

    • memory/4244-76-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

      Filesize

      64KB

    • memory/4244-94-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

      Filesize

      64KB

    • memory/4244-95-0x0000000006D30000-0x0000000006DD2000-memory.dmp

      Filesize

      648KB

    • memory/4244-96-0x00000000093B0000-0x00000000093E8000-memory.dmp

      Filesize

      224KB

    • memory/4244-78-0x0000000006A80000-0x0000000006A9A000-memory.dmp

      Filesize

      104KB

    • memory/4244-71-0x0000000000500000-0x0000000000604000-memory.dmp

      Filesize

      1.0MB

    • memory/4244-73-0x0000000005500000-0x0000000005AA4000-memory.dmp

      Filesize

      5.6MB

    • memory/4244-104-0x0000000074C70000-0x0000000075420000-memory.dmp

      Filesize

      7.7MB

    • memory/4244-75-0x0000000004FF0000-0x000000000508C000-memory.dmp

      Filesize

      624KB

    • memory/4244-74-0x0000000004F50000-0x0000000004FE2000-memory.dmp

      Filesize

      584KB

    • memory/4244-93-0x0000000074C70000-0x0000000075420000-memory.dmp

      Filesize

      7.7MB

    • memory/4244-77-0x0000000004EB0000-0x0000000004EBA000-memory.dmp

      Filesize

      40KB

    • memory/4424-109-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4424-105-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4424-106-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4424-103-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4424-100-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB