gbermudez2

Oski Writeup

April 28, 2025

Link: Oski Lab

Summary

Procedure

  1. The scenario involves a suspicious .ppt file that triggered SIEM alerts. The hash produced by the file is as follows:
    • 12c1842c3ccafe7408c23ebf292ee3d9
  2. Using the MD5 hash, the first thought that came to mind was pasting it into VirusTotal for some insights.
    • This is very clearly a malicious file, with 62 vendors flagging it as a trojan.
    • Looking through the Crowdsourced IDS rules, we can see that it’s labeled as the StealC C2 malware, a known infostealer.

      image

  3. We want to find out the Creation Time of this malware. The Details tab has all we need for this information.
    • Located in the History section, we can see the Creation Time.
    • I found it interesting to note that while the malware was made in 2022, its first sighting was almost exactly a year later.

      image

  4. The lab notes that the malware involved Command and Control, so we can find out the source of the attacks based on any identified IPs.
    • According to the Contacted URLs section under the Relations tab, there seems to be 2 notable URLs, notably with a domain that shares a common IP.
    • With C2, attackers may set up web servers to beacon and exfiltrate data from their victims.

      image

  5. If we go to the Behavior section, we can look through the file interactions that the malware has, under Activity Summary.
    • Many files are modified when this malware is executed, but notably, there is a file called sqlite3.dll under the Files Dropped section.
    • According to HYAS’ StealC Report, the malware requests this SQL library to assist with credential exfiltration and database access.

      image

  6. The lab mentions that the StealC malware utilizes RC4 for “decrypting a base64 string”. Upon research, this method of encryption is used to most likely evade detection from anti-malware or static code scanning.
    • Admittedly, I was not familiar with RC4 before, so I did some research on it, and it is a stream-cipher algorithm created by the makers of the RSA algorithm.
    • Analyzing the malware may give insights into the RC4 key that the malware authors used to encrypt their code.
    • any.run has a library of user reports regarding malware. I made a search using the hash, and clicked on the oldest entry to view the report.

      image

    • I scrolled down a bit to view any relevant information, and I found some under Malware Configuration. There’s a convenient section labeled “Keys” that contained the RC4 key. Using this to decrypt the attacker’s code would be extremely useful for static code analysis.

      image

  7. StealC, as I mentioned earlier, is a known infostealer. Knowing the TTPs of the attackers can reveal vital information into how these attacks operate.
    • Luckily, the full any.run report contains information regarding these tactics and techniques in a convenient ATT&CK matrix.

      image

    • StealC steals credentials like passwords from their victims. This is labeled as “Credentials from Password Stores” under Credential Access, aka T1555.

      image

  8. In addition to code obfuscation, StealC and similar malware may induce tactics to evade further detection by analysts.
    • I remembered from my earlier analysis that VirusTotal lists the files that were deleted. However, these didn’t correlate to any specific directory or file pattern for Defense Evasion; these files were deleted on execution.
    • I decided to go back to the any.run analysis. Within the MITRE ATT&CK matrix, there’s a technique labeled “Indicator Removal” under the tactic Defense Evasion.
    • Within the command line details, there’s a command called “del C:\ProgramData*.dll” that self-deletes after payload execution. Judging by the .dll, it appears to remove any traces of the malware libraries in the ProgramData folder.
    • Looking earlier into the command, the “timeout /t 5” also indicates that the malware waits 5 seconds after exfiltration before self-deleting.

    image

Most advanced malware have the capability to evade detection and cyber defenses; it’s important to be vigilant and look for other indicators beyond physical evidence, such as behavior and heuristics.