Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 6020943651-FOR-ATENS.xls.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RFQ 6020943651-FOR-ATENS.xls.xll
Resource
win10v2004-20231215-en
General
-
Target
RFQ 6020943651-FOR-ATENS.xls.xll
-
Size
879KB
-
MD5
2344d5013ae84f4d70bf359575fba402
-
SHA1
ed763a02ea15c388ec462cb9a4dfba22d0248631
-
SHA256
338ffcde4891ef19f8b2974f2a9188e14a90f592322c8fb07acb662b57b35771
-
SHA512
0d532edf4d2a6d2daab537dcb8e8e1b50cb0b27c3b0e4745b9748a06ecc287f025c77e1ee68172454b63a916e66bb611a930e2a0d22c1ff5922d2e98121e0a3d
-
SSDEEP
24576:pzbGHAzHAjX1lcLgUarYin3qy8sCwFCvlFC:pziHIvEzn3qy8QFW
Malware Config
Extracted
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 4892 service.exe 5012 service.exe -
Loads dropped DLL 2 IoCs
pid Process 1088 EXCEL.EXE 1088 EXCEL.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4892 set thread context of 5012 4892 service.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 4668 5012 WerFault.exe 93 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1088 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4892 service.exe 4892 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1088 EXCEL.EXE 1088 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE 1088 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4892 1088 EXCEL.EXE 92 PID 1088 wrote to memory of 4892 1088 EXCEL.EXE 92 PID 1088 wrote to memory of 4892 1088 EXCEL.EXE 92 PID 4892 wrote to memory of 5012 4892 service.exe 93 PID 4892 wrote to memory of 5012 4892 service.exe 93 PID 4892 wrote to memory of 5012 4892 service.exe 93 PID 4892 wrote to memory of 5012 4892 service.exe 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ 6020943651-FOR-ATENS.xls.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 2324⤵
- Program crash
PID:4668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5012 -ip 50121⤵PID:1428