Analysis
-
max time kernel
167s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
4ebc548df517cae4c7e3122e9c75ede6.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ebc548df517cae4c7e3122e9c75ede6.xll
Resource
win10v2004-20231215-en
General
-
Target
4ebc548df517cae4c7e3122e9c75ede6.xll
-
Size
880KB
-
MD5
4ebc548df517cae4c7e3122e9c75ede6
-
SHA1
6e19e1e6f3a7b96cf562c2f6768f92580652d427
-
SHA256
6c67e1ccf77b872b1f3cf257a257d75c4995dc079945080f578b51357ccdbe55
-
SHA512
359be199470a83ad32db555840c5b33a6b69db96cc188d83d550639fe9fe75464529819fdf0cded9d489cb7ba03802667ac373d3ad2a3f7e4069b023c8508290
-
SSDEEP
24576:/zbGHAzHAjX1BcLgtBoKF0KihRPX0qFNE:/ziHILEV6Fm
Malware Config
Extracted
Extracted
oski
himarkh.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 2684 service.exe 4596 service.exe -
Loads dropped DLL 2 IoCs
pid Process 3912 EXCEL.EXE 3912 EXCEL.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 4596 2684 service.exe 109 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3912 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2684 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3912 EXCEL.EXE 3912 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE 3912 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2684 3912 EXCEL.EXE 98 PID 3912 wrote to memory of 2684 3912 EXCEL.EXE 98 PID 3912 wrote to memory of 2684 3912 EXCEL.EXE 98 PID 2684 wrote to memory of 4596 2684 service.exe 109 PID 2684 wrote to memory of 4596 2684 service.exe 109 PID 2684 wrote to memory of 4596 2684 service.exe 109 PID 2684 wrote to memory of 4596 2684 service.exe 109
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4ebc548df517cae4c7e3122e9c75ede6.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:4596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
880KB
MD54ebc548df517cae4c7e3122e9c75ede6
SHA16e19e1e6f3a7b96cf562c2f6768f92580652d427
SHA2566c67e1ccf77b872b1f3cf257a257d75c4995dc079945080f578b51357ccdbe55
SHA512359be199470a83ad32db555840c5b33a6b69db96cc188d83d550639fe9fe75464529819fdf0cded9d489cb7ba03802667ac373d3ad2a3f7e4069b023c8508290
-
Filesize
12KB
MD536cadc2fa9f7938f74061fda9b126a9f
SHA15252934ac46fb3bc8fdb361880ade043070501bd
SHA256afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4
SHA512b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f
-
Filesize
680KB
MD5c20495a19b01f9258ca23d01933ec47e
SHA11642d96fb066baaa592e6b147e7a40cb49aeb2ba
SHA25661c1436f9b48159b56f1f71561626724682d54e1714ec722c76c3b7667f0cbb7
SHA512b84494e422b2231141836a8ef0bbe04e6fd17c189dcbabacd8b3cbfe9dc5b224dfbefa457fb105f147350b45044e7a0363a101fe008e3610aa066bd379d4ed68