Analysis

  • max time kernel
    137s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2024 05:27

General

  • Target

    PO# HM00050746 13461-001,xls.xll

  • Size

    1.4MB

  • MD5

    a719b4a9d08553ff7683ddcb7003d68b

  • SHA1

    9039d4c0ed993549537bcf365fe35c553bd2ba50

  • SHA256

    fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

  • SHA512

    74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

  • SSDEEP

    24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 1228
          4⤵
          • Program crash
          PID:3364
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4956 -ip 4956
    1⤵
      PID:4524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll

      Filesize

      1.4MB

      MD5

      a719b4a9d08553ff7683ddcb7003d68b

      SHA1

      9039d4c0ed993549537bcf365fe35c553bd2ba50

      SHA256

      fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

      SHA512

      74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

    • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

      Filesize

      12KB

      MD5

      36cadc2fa9f7938f74061fda9b126a9f

      SHA1

      5252934ac46fb3bc8fdb361880ade043070501bd

      SHA256

      afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

      SHA512

      b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      64KB

      MD5

      adcffe8642dc00a4ffa3b3fc0f714913

      SHA1

      57c4609cb93fb3b39df0bc3849aa729c3436fd1a

      SHA256

      bc2419aba3272c09ddbf14fbb22a695929ff34314ff16b9684bb080a9de822d0

      SHA512

      2b548cc8511b56cb9f364ffbcd99cfd496d8ab0fe34d39a15a4a801f3e5c9bcaa388fd4d86ab52c190a3d6c08c2a54bdd013361189f315f623b49c872bb22d98

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      964KB

      MD5

      26290bd5d8894f44aad3bf9acbfe7343

      SHA1

      e67e76e649e34602d3eedd5d9f500e5cff6ead14

      SHA256

      5cf015c5169ac573c0cdebc3822b1c33009e4c920eee4fc37ea6adbd0a60cd02

      SHA512

      2047754da0dfbe2ae375a3c54407470e45eabcc8dcc92025d2bbc0b556b2eab279363e1956d5e16eafa55eedbcc9c44dfd92e00795bbf2457811d6ba74e23816

    • C:\Users\Admin\AppData\Roaming\service.exe

      Filesize

      996KB

      MD5

      fd488d558cce533dbdd6dd407ef1fd32

      SHA1

      bc57c81ad80d65fca56edde78cbf9db7ed53beb3

      SHA256

      2c37d0e68dc954c03b941ba7cd3188993bba2a5867093b8905c696f811e93914

      SHA512

      d14c80f803714ef9fb0b6e9169735ba30b6371e217d24bfdfc325c0058e5c470a82b652706f65ba733074fecc9471b35023fa7ad57e727b19554012da2c825f8

    • memory/1420-81-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-15-0x00007FFC22430000-0x00007FFC22440000-memory.dmp

      Filesize

      64KB

    • memory/1420-3-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-7-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-6-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-8-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-9-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-10-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-5-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-12-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-11-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-4-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-13-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-130-0x00007FFC3C9C0000-0x00007FFC3D481000-memory.dmp

      Filesize

      10.8MB

    • memory/1420-16-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-14-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-17-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-19-0x00007FFC22430000-0x00007FFC22440000-memory.dmp

      Filesize

      64KB

    • memory/1420-26-0x000001F187590000-0x000001F18770C000-memory.dmp

      Filesize

      1.5MB

    • memory/1420-29-0x000001F188BF0000-0x000001F188C0C000-memory.dmp

      Filesize

      112KB

    • memory/1420-30-0x00007FFC3C9C0000-0x00007FFC3D481000-memory.dmp

      Filesize

      10.8MB

    • memory/1420-31-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-32-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-33-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-34-0x000001F188DB0000-0x000001F188DEC000-memory.dmp

      Filesize

      240KB

    • memory/1420-35-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-36-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-37-0x000001F188E40000-0x000001F188F44000-memory.dmp

      Filesize

      1.0MB

    • memory/1420-38-0x000001F188F40000-0x000001F188F50000-memory.dmp

      Filesize

      64KB

    • memory/1420-2-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-129-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-128-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-1-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-125-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-126-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-127-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-0-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

      Filesize

      64KB

    • memory/1420-94-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-85-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

      Filesize

      2.0MB

    • memory/1420-86-0x00007FFC3C9C0000-0x00007FFC3D481000-memory.dmp

      Filesize

      10.8MB

    • memory/1420-89-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-90-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-91-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-92-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/1420-93-0x000001F188F80000-0x000001F188F90000-memory.dmp

      Filesize

      64KB

    • memory/3240-78-0x0000000005330000-0x00000000058D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3240-96-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

      Filesize

      64KB

    • memory/3240-106-0x0000000074600000-0x0000000074DB0000-memory.dmp

      Filesize

      7.7MB

    • memory/3240-84-0x0000000005B00000-0x0000000005B1A000-memory.dmp

      Filesize

      104KB

    • memory/3240-98-0x00000000091A0000-0x00000000091D8000-memory.dmp

      Filesize

      224KB

    • memory/3240-83-0x0000000004D30000-0x0000000004D3A000-memory.dmp

      Filesize

      40KB

    • memory/3240-76-0x0000000074600000-0x0000000074DB0000-memory.dmp

      Filesize

      7.7MB

    • memory/3240-95-0x0000000074600000-0x0000000074DB0000-memory.dmp

      Filesize

      7.7MB

    • memory/3240-77-0x00000000001B0000-0x00000000002B0000-memory.dmp

      Filesize

      1024KB

    • memory/3240-79-0x0000000004C80000-0x0000000004D12000-memory.dmp

      Filesize

      584KB

    • memory/3240-97-0x0000000006B00000-0x0000000006BA0000-memory.dmp

      Filesize

      640KB

    • memory/3240-80-0x0000000004E20000-0x0000000004EBC000-memory.dmp

      Filesize

      624KB

    • memory/3240-82-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

      Filesize

      64KB

    • memory/4956-109-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4956-102-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4956-104-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4956-100-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4956-105-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB