Analysis
-
max time kernel
101s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
PO# HM00050746 13461-001,xls.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO# HM00050746 13461-001,xls.xll
Resource
win10v2004-20231222-en
General
-
Target
PO# HM00050746 13461-001,xls.xll
-
Size
1.4MB
-
MD5
a719b4a9d08553ff7683ddcb7003d68b
-
SHA1
9039d4c0ed993549537bcf365fe35c553bd2ba50
-
SHA256
fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b
-
SHA512
74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7
-
SSDEEP
24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY
Malware Config
Extracted
Extracted
oski
himarkh.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 5060 service.exe 4196 service.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 EXCEL.EXE 2136 EXCEL.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5060 set thread context of 4196 5060 service.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 4576 4196 WerFault.exe 98 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2136 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2136 EXCEL.EXE 2136 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE 2136 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 5060 2136 EXCEL.EXE 89 PID 2136 wrote to memory of 5060 2136 EXCEL.EXE 89 PID 2136 wrote to memory of 5060 2136 EXCEL.EXE 89 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98 PID 5060 wrote to memory of 4196 5060 service.exe 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO# HM00050746 13461-001,xls.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 13164⤵
- Program crash
PID:4576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4196 -ip 41961⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5244fd2c9b0b9362f88dbfd29e1cbd546
SHA121f4b88c0aa75773c0c64f0254cb5cf905b09226
SHA25675a9c86c578546f16f15f16b66b1d83cf7cd6a8e3c412b7fe534d932734d1ef0
SHA5129cc25fc29958b62478e133670de89838bde26125f688e16fe360bf177f00b3c0ac675c927311380f3d55990fb9064e00f06df8296dc30554568d35b657108ead
-
Filesize
374KB
MD5d507e2a05934b837a53bc56c66ea9b88
SHA14883564b19d00903ac4b8784279335fc13f2b36e
SHA2566fc1fc59e518c2fcba9f8ea56c69155116ffbcda9a7927eaec96be0d515d95ed
SHA51246fa75809f414f7c9173e1503532af8b1916e45027f943a6b6907d4fc71d86310bacabb2e328bba51d9ad09b49fdc1ac08fcb3531b22d01bee4f3605fe0cd2ee
-
Filesize
12KB
MD536cadc2fa9f7938f74061fda9b126a9f
SHA15252934ac46fb3bc8fdb361880ade043070501bd
SHA256afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4
SHA512b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f
-
Filesize
735KB
MD5eae1a88868c72b18ea95a3a78debd7b6
SHA1433be2335042c24c721be837bf653f900a4d732a
SHA256180874c0bd8acc8d816f4fef6baf72baa56673ea924b3e73d5b590a8857c4bdf
SHA512669309d82b5d8e6823b0d596907ceecb01a78ffad5c6ccdac0d8bd9f7f679b429ccbd08341ab1f40079e1c4887bcaeb7fc377c4709400257de31951ae7fa2bad
-
Filesize
241KB
MD5499fc8aab8c0c41790580296eaade840
SHA184b270684d1cb5631786b01f9ba3b8a86ce8b396
SHA2565578dee61f8a1b550a6c6a450e4d6acc522c33e8bed1b077c96389c608e7809f
SHA512ee4319c610fa21a9ea67ee55a6957fb3ec89f3ee3364a4da96f95c14fcc153b730d4c5bac6837cef4ecfe56c7feed9cc71ce60c3b4f279ce0b736c41802f652d
-
Filesize
257KB
MD53cfe0f19db983f4e9f6c5413d35eda09
SHA1059dea29ead2f3af034740520d6520f81f4d58c4
SHA2564145ce5f063208ff7bc7518b75a79060dda3af0b3e71b06fc5a7b4b0dfc37e2f
SHA51251592785b7f8bcf2d075a81cdab3240bc6b6ca80b001d08b77ed12837cb7d450515d8fbd36fdeb993fa142b2c8ff9b41deff1c31c706e4e5f355648c62154b7a
-
Filesize
319KB
MD5d1de2bcfece34d4297f8ba32259e2b84
SHA1cb5b8736bdf405b2ae6dc3a719b5b5264ef68340
SHA256fff8856f94cdf92a4d3bee7defdb04be9e31340ddd6c2a6434005ffcfd899e72
SHA512ece542a256b9ce3148bd45003c65952f772e6f631739b87c0ab9a64c30f30935dce42c6d9aa5e23e137e20a21f61615724eb81ca9ed5b51ce42914b5b4ec1ced