Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:37
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER AZAS112.xls.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER AZAS112.xls.xll
Resource
win10v2004-20231222-en
General
-
Target
PURCHASE ORDER AZAS112.xls.xll
-
Size
880KB
-
MD5
4ebc548df517cae4c7e3122e9c75ede6
-
SHA1
6e19e1e6f3a7b96cf562c2f6768f92580652d427
-
SHA256
6c67e1ccf77b872b1f3cf257a257d75c4995dc079945080f578b51357ccdbe55
-
SHA512
359be199470a83ad32db555840c5b33a6b69db96cc188d83d550639fe9fe75464529819fdf0cded9d489cb7ba03802667ac373d3ad2a3f7e4069b023c8508290
-
SSDEEP
24576:/zbGHAzHAjX1BcLgtBoKF0KihRPX0qFNE:/ziHILEV6Fm
Malware Config
Extracted
Extracted
oski
himarkh.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 912 service.exe 5076 service.exe -
Loads dropped DLL 2 IoCs
pid Process 976 EXCEL.EXE 976 EXCEL.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 912 set thread context of 5076 912 service.exe 95 -
Program crash 1 IoCs
pid pid_target Process procid_target 4632 5076 WerFault.exe 95 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 976 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 912 service.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 976 wrote to memory of 912 976 EXCEL.EXE 93 PID 976 wrote to memory of 912 976 EXCEL.EXE 93 PID 976 wrote to memory of 912 976 EXCEL.EXE 93 PID 912 wrote to memory of 5076 912 service.exe 95 PID 912 wrote to memory of 5076 912 service.exe 95 PID 912 wrote to memory of 5076 912 service.exe 95 PID 912 wrote to memory of 5076 912 service.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER AZAS112.xls.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 9444⤵
- Program crash
PID:4632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5076 -ip 50761⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59417223b17c61e2ebc5c35b7b11282f4
SHA1f2e6ddc924896c10ad587a205051c8b9c921e84f
SHA256056043d93299c907a76868660220920f1056e768d6da369a5eea1ea84f077141
SHA512694da8e18d0a1009cd358dab8f50b107f2727e8ed558ad7fb73ed7d172769f5a8891fe0354927256db1814c71542f89509b795ccea789865160fc3a8cca686b8
-
Filesize
680KB
MD5c20495a19b01f9258ca23d01933ec47e
SHA11642d96fb066baaa592e6b147e7a40cb49aeb2ba
SHA25661c1436f9b48159b56f1f71561626724682d54e1714ec722c76c3b7667f0cbb7
SHA512b84494e422b2231141836a8ef0bbe04e6fd17c189dcbabacd8b3cbfe9dc5b224dfbefa457fb105f147350b45044e7a0363a101fe008e3610aa066bd379d4ed68