Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 18:58

General

  • Target

    a719b4a9d08553ff7683ddcb7003d68b.xll

  • Size

    1.4MB

  • MD5

    a719b4a9d08553ff7683ddcb7003d68b

  • SHA1

    9039d4c0ed993549537bcf365fe35c553bd2ba50

  • SHA256

    fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

  • SHA512

    74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

  • SSDEEP

    24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a719b4a9d08553ff7683ddcb7003d68b.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Users\Admin\AppData\Roaming\service.exe
      "C:\Users\Admin\AppData\Roaming\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4320
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        PID:860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 1344
          4⤵
          • Program crash
          PID:2668
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 860 -ip 860
      1⤵
        PID:2664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\a719b4a9d08553ff7683ddcb7003d68b.xll

        Filesize

        303KB

        MD5

        3e5e38ad345730163190497c76096f7c

        SHA1

        a29f4fcc998605f8a41303a5653dc6396226e715

        SHA256

        654a3a8c6280f46d639236c6577b264745431ee56a3268ac1b20101873b2cb64

        SHA512

        fa7a252c186185016ffd23911ddb6d300fc371a6c755fc119ce6e8002673af2fd69398f382e983a06592536bbfaacc5fbb2fba334b6611ee3a6b01dd50f85a43

      • C:\Users\Admin\AppData\Local\Temp\a719b4a9d08553ff7683ddcb7003d68b.xll

        Filesize

        322KB

        MD5

        a1f3f8661a0f0f130bd6d94efd577cbe

        SHA1

        700f60669b44659da9d043c69c70a10085cc9e1b

        SHA256

        02b0a688a7b81b9f113a7190ba0396d0e69abe01fa8bd89637b16873210b6b77

        SHA512

        318ae73121997dfc5b9d8ec1ebd64c2d8140543a867552a81a007e051ffda0acae2f6e71c3b4c41def102966468b241682dc5478ee8ba812d8a786c5dbd0b9f7

      • C:\Users\Admin\AppData\Local\Temp\sample.xlsx

        Filesize

        12KB

        MD5

        36cadc2fa9f7938f74061fda9b126a9f

        SHA1

        5252934ac46fb3bc8fdb361880ade043070501bd

        SHA256

        afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4

        SHA512

        b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f

      • C:\Users\Admin\AppData\Roaming\service.exe

        Filesize

        996KB

        MD5

        fd488d558cce533dbdd6dd407ef1fd32

        SHA1

        bc57c81ad80d65fca56edde78cbf9db7ed53beb3

        SHA256

        2c37d0e68dc954c03b941ba7cd3188993bba2a5867093b8905c696f811e93914

        SHA512

        d14c80f803714ef9fb0b6e9169735ba30b6371e217d24bfdfc325c0058e5c470a82b652706f65ba733074fecc9471b35023fa7ad57e727b19554012da2c825f8

      • memory/860-116-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/860-112-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/860-111-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/860-110-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/860-107-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/884-40-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-63-0x0000017C25C90000-0x0000017C26751000-memory.dmp

        Filesize

        10.8MB

      • memory/884-7-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-8-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-9-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-10-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-11-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-12-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-13-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-15-0x00007FFEB3C20000-0x00007FFEB3C30000-memory.dmp

        Filesize

        64KB

      • memory/884-14-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-16-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-17-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-18-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-19-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-20-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-21-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-22-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-23-0x00007FFEB3C20000-0x00007FFEB3C30000-memory.dmp

        Filesize

        64KB

      • memory/884-30-0x0000017C24610000-0x0000017C2478C000-memory.dmp

        Filesize

        1.5MB

      • memory/884-33-0x0000017C26870000-0x0000017C2688C000-memory.dmp

        Filesize

        112KB

      • memory/884-34-0x0000017C25C90000-0x0000017C26751000-memory.dmp

        Filesize

        10.8MB

      • memory/884-35-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-37-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-39-0x0000017C3E930000-0x0000017C3E96C000-memory.dmp

        Filesize

        240KB

      • memory/884-38-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-36-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-5-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-41-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-42-0x0000017C1F3B0000-0x0000017C1F4B4000-memory.dmp

        Filesize

        1.0MB

      • memory/884-43-0x0000017C1F2D0000-0x0000017C1F2E0000-memory.dmp

        Filesize

        64KB

      • memory/884-6-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-84-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-138-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-137-0x0000017C25C90000-0x0000017C26751000-memory.dmp

        Filesize

        10.8MB

      • memory/884-136-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-135-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-85-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-134-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-133-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-0-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-2-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-89-0x0000017C25C90000-0x0000017C26751000-memory.dmp

        Filesize

        10.8MB

      • memory/884-91-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-92-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-93-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-96-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-97-0x0000017C3E9C0000-0x0000017C3E9D0000-memory.dmp

        Filesize

        64KB

      • memory/884-1-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/884-4-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmp

        Filesize

        2.0MB

      • memory/884-3-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmp

        Filesize

        64KB

      • memory/4320-87-0x0000000004F50000-0x0000000004F5A000-memory.dmp

        Filesize

        40KB

      • memory/4320-105-0x0000000006A00000-0x0000000006AA0000-memory.dmp

        Filesize

        640KB

      • memory/4320-101-0x0000000005330000-0x0000000005340000-memory.dmp

        Filesize

        64KB

      • memory/4320-99-0x0000000074520000-0x0000000074CD0000-memory.dmp

        Filesize

        7.7MB

      • memory/4320-88-0x00000000054F0000-0x000000000550A000-memory.dmp

        Filesize

        104KB

      • memory/4320-113-0x0000000074520000-0x0000000074CD0000-memory.dmp

        Filesize

        7.7MB

      • memory/4320-106-0x0000000006B00000-0x0000000006B38000-memory.dmp

        Filesize

        224KB

      • memory/4320-86-0x0000000005330000-0x0000000005340000-memory.dmp

        Filesize

        64KB

      • memory/4320-83-0x00000000050B0000-0x000000000514C000-memory.dmp

        Filesize

        624KB

      • memory/4320-82-0x0000000004F70000-0x0000000005002000-memory.dmp

        Filesize

        584KB

      • memory/4320-81-0x0000000005520000-0x0000000005AC4000-memory.dmp

        Filesize

        5.6MB

      • memory/4320-80-0x0000000000470000-0x0000000000570000-memory.dmp

        Filesize

        1024KB

      • memory/4320-79-0x0000000074520000-0x0000000074CD0000-memory.dmp

        Filesize

        7.7MB