Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:46
Static task
static1
Behavioral task
behavioral1
Sample
2344d5013ae84f4d70bf359575fba402.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2344d5013ae84f4d70bf359575fba402.xll
Resource
win10v2004-20231215-en
General
-
Target
2344d5013ae84f4d70bf359575fba402.xll
-
Size
879KB
-
MD5
2344d5013ae84f4d70bf359575fba402
-
SHA1
ed763a02ea15c388ec462cb9a4dfba22d0248631
-
SHA256
338ffcde4891ef19f8b2974f2a9188e14a90f592322c8fb07acb662b57b35771
-
SHA512
0d532edf4d2a6d2daab537dcb8e8e1b50cb0b27c3b0e4745b9748a06ecc287f025c77e1ee68172454b63a916e66bb611a930e2a0d22c1ff5922d2e98121e0a3d
-
SSDEEP
24576:pzbGHAzHAjX1lcLgUarYin3qy8sCwFCvlFC:pziHIvEzn3qy8QFW
Malware Config
Extracted
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 1452 service.exe 4812 service.exe -
Loads dropped DLL 2 IoCs
pid Process 3260 EXCEL.EXE 3260 EXCEL.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 4812 1452 service.exe 101 -
Program crash 2 IoCs
pid pid_target Process procid_target 4364 1452 WerFault.exe 94 1940 4812 WerFault.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3260 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1452 service.exe 1452 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3260 EXCEL.EXE 3260 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE 3260 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3260 wrote to memory of 1452 3260 EXCEL.EXE 94 PID 3260 wrote to memory of 1452 3260 EXCEL.EXE 94 PID 3260 wrote to memory of 1452 3260 EXCEL.EXE 94 PID 1452 wrote to memory of 4812 1452 service.exe 101 PID 1452 wrote to memory of 4812 1452 service.exe 101 PID 1452 wrote to memory of 4812 1452 service.exe 101 PID 1452 wrote to memory of 4812 1452 service.exe 101
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2344d5013ae84f4d70bf359575fba402.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 4243⤵
- Program crash
PID:4364
-
-
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1452 -ip 14521⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4812 -ip 48121⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 2321⤵
- Program crash
PID:1940