Analysis
-
max time kernel
101s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
8b5c6a2b226e7c6ba532e8448d6bfc82.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b5c6a2b226e7c6ba532e8448d6bfc82.xll
Resource
win10v2004-20231215-en
General
-
Target
8b5c6a2b226e7c6ba532e8448d6bfc82.xll
-
Size
1.4MB
-
MD5
8b5c6a2b226e7c6ba532e8448d6bfc82
-
SHA1
723acb3cba81639e58e0041da83f2db58077cedf
-
SHA256
2a71fdd923c2c1cf13ffee31c74aed4a464ff0c97cf9a6c42a788d4fdcec3efd
-
SHA512
3f994a7f1edbd35f5c0d66868a5ba848d501849f185012cfe86224f1be5fa03efd1dfea8494d270cd8a08f03a07f90d9ae990fabb88964a510b208227ab1b997
-
SSDEEP
24576:WzbGHAzHAjX18cLgGglNv9lyttyCKiCtXNs4sHqQDmMmkZ5TQ1oj5+QPybODrB++:WziHIaEG+strCPsDFp/6e98OM
Malware Config
Extracted
Extracted
oski
irkark.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 4244 service.exe 4424 service.exe -
Loads dropped DLL 2 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4244 set thread context of 4424 4244 service.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 4424 WerFault.exe 97 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4236 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4244 4236 EXCEL.EXE 89 PID 4236 wrote to memory of 4244 4236 EXCEL.EXE 89 PID 4236 wrote to memory of 4244 4236 EXCEL.EXE 89 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97 PID 4244 wrote to memory of 4424 4244 service.exe 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8b5c6a2b226e7c6ba532e8448d6bfc82.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 12964⤵
- Program crash
PID:2828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5345b8d7aa36df23d6c4dfe9d5370094a
SHA1062fb3a7d39b075aa0c5a8cc6030b66abf1482d8
SHA25622e5a766719465fbd40fc4f93f5d0e56a8d398977ab4b194d25f3b0f7adf2ee6
SHA5124e6ff30f380a7b7769aa6de7a275bcc2d56002b8b229178f60604bcf9f1897e6e1679d159cb32ef58a37e03f7d8335d45a2a156654cd4f07e0d3eb56f5f325d6
-
Filesize
221KB
MD5172f0c0ec30e78bdbf1d4dc91aa3ebb3
SHA1b2c3a4e8c15105eb8bfe7872db07866a1207b5e4
SHA256c4a6e41d81f4e49533b28abcc7e167468a5c232fc1d88de4418e3a5a165d086c
SHA512a2eb29fe3580d7fd275a509c6926ca0ba4f1c1b504362f6d777635aca539e705319dbcba016daf2dd162b006835b9a2fae52bfed4657e15c5c55ec238e39d1b4
-
Filesize
12KB
MD536cadc2fa9f7938f74061fda9b126a9f
SHA15252934ac46fb3bc8fdb361880ade043070501bd
SHA256afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4
SHA512b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f
-
Filesize
1016KB
MD51f3f0df96f20b886328d79074944067d
SHA193658ff5de14681b09439fe94e272f4f329e3a8a
SHA25651855bf07f8dbe24ca6f11c6dc9bd4e8c27bed93159f96afdb448cce7bf7d515
SHA51261ebb3d18e21702bad5ece5701e019322ac4a44b5c1b5be4ca54fb9d7f89a4b2c9541fe7fa49fbb0f61d74751eeaca15302190233dc8d1e5ed50c958789d1b0b
-
Filesize
109KB
MD5e10c90d48b3d65b000327e40c3dfe163
SHA1d787616a818cf49ff4afbe316bac8df1cab54c63
SHA2569f2adb431adc11dfa304e65a7cdb6a036a635137fa253db862811f48599c7569
SHA512bd2a4d597815ba1ec18b94b24473cf9d157632f68e5129d6ff7bf1a2980fdf33d36b2fc6ec1cc63b162b31344670c88fa6225e62374771155673fda385665886
-
Filesize
68KB
MD5ed0e37844462bf5276fce30896c37b5a
SHA129c6a8f08a5ab5abbcc5f69fe69a02dbcc8bf38c
SHA2563d844adb11b19c5d7324f0f50f1d8c06adbec9bd34d7bcc886dcdeb288bfe051
SHA512bb536c8e800bd6815d492f852a21b6b555111180c0936f805dd3193df88246f867e5f9e040a8bff0284ec18638edf34efb6a485a7efe48dc3274dc23d20da188
-
Filesize
94KB
MD539677c1fe5c7db242e8012361dbc443e
SHA1b94af77671343fa08e8c624713e830ed9d4e597f
SHA2561561b667cb948226e5c2606dd0990d6fb64c8247cfe39012e4e6907db9ff870e
SHA512472a70c30556a0338aab7e5dd86ffe0d5cb5ae35af11fc50cbbb383fc215acde6b332981bd3085def9204f5d56279bcaeec27c330f9a838c671b1f3c05aeee0e