Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 6020943651-FOR-ATENS.xls.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RFQ 6020943651-FOR-ATENS.xls.xll
Resource
win10v2004-20231215-en
General
-
Target
RFQ 6020943651-FOR-ATENS.xls.xll
-
Size
879KB
-
MD5
2344d5013ae84f4d70bf359575fba402
-
SHA1
ed763a02ea15c388ec462cb9a4dfba22d0248631
-
SHA256
338ffcde4891ef19f8b2974f2a9188e14a90f592322c8fb07acb662b57b35771
-
SHA512
0d532edf4d2a6d2daab537dcb8e8e1b50cb0b27c3b0e4745b9748a06ecc287f025c77e1ee68172454b63a916e66bb611a930e2a0d22c1ff5922d2e98121e0a3d
-
SSDEEP
24576:pzbGHAzHAjX1lcLgUarYin3qy8sCwFCvlFC:pziHIvEzn3qy8QFW
Malware Config
Extracted
Extracted
oski
chikkark.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 4580 service.exe 4292 service.exe -
Loads dropped DLL 2 IoCs
pid Process 4032 EXCEL.EXE 4032 EXCEL.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4580 set thread context of 4292 4580 service.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 4124 4292 WerFault.exe 94 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4032 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4580 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4032 EXCEL.EXE 4032 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4580 4032 EXCEL.EXE 93 PID 4032 wrote to memory of 4580 4032 EXCEL.EXE 93 PID 4032 wrote to memory of 4580 4032 EXCEL.EXE 93 PID 4580 wrote to memory of 4292 4580 service.exe 94 PID 4580 wrote to memory of 4292 4580 service.exe 94 PID 4580 wrote to memory of 4292 4580 service.exe 94 PID 4580 wrote to memory of 4292 4580 service.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ 6020943651-FOR-ATENS.xls.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 12964⤵
- Program crash
PID:4124
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4292 -ip 42921⤵PID:3052