Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER AZAS112.xls.xll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER AZAS112.xls.xll
Resource
win10v2004-20240226-en
General
-
Target
PURCHASE ORDER AZAS112.xls.xll
-
Size
880KB
-
MD5
4ebc548df517cae4c7e3122e9c75ede6
-
SHA1
6e19e1e6f3a7b96cf562c2f6768f92580652d427
-
SHA256
6c67e1ccf77b872b1f3cf257a257d75c4995dc079945080f578b51357ccdbe55
-
SHA512
359be199470a83ad32db555840c5b33a6b69db96cc188d83d550639fe9fe75464529819fdf0cded9d489cb7ba03802667ac373d3ad2a3f7e4069b023c8508290
-
SSDEEP
24576:/zbGHAzHAjX1BcLgtBoKF0KihRPX0qFNE:/ziHILEV6Fm
Malware Config
Extracted
oski
himarkh.xyz
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Executes dropped EXE 2 IoCs
pid Process 2236 service.exe 2104 service.exe -
Loads dropped DLL 2 IoCs
pid Process 5084 EXCEL.EXE 5084 EXCEL.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 2104 2236 service.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 3424 2104 WerFault.exe 90 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5084 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2236 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5084 EXCEL.EXE 5084 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5084 wrote to memory of 2236 5084 EXCEL.EXE 89 PID 5084 wrote to memory of 2236 5084 EXCEL.EXE 89 PID 5084 wrote to memory of 2236 5084 EXCEL.EXE 89 PID 2236 wrote to memory of 2104 2236 service.exe 90 PID 2236 wrote to memory of 2104 2236 service.exe 90 PID 2236 wrote to memory of 2104 2236 service.exe 90 PID 2236 wrote to memory of 2104 2236 service.exe 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER AZAS112.xls.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 13204⤵
- Program crash
PID:3424
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2104 -ip 21041⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
880KB
MD54ebc548df517cae4c7e3122e9c75ede6
SHA16e19e1e6f3a7b96cf562c2f6768f92580652d427
SHA2566c67e1ccf77b872b1f3cf257a257d75c4995dc079945080f578b51357ccdbe55
SHA512359be199470a83ad32db555840c5b33a6b69db96cc188d83d550639fe9fe75464529819fdf0cded9d489cb7ba03802667ac373d3ad2a3f7e4069b023c8508290
-
Filesize
12KB
MD536cadc2fa9f7938f74061fda9b126a9f
SHA15252934ac46fb3bc8fdb361880ade043070501bd
SHA256afc8ea53b3eeb62a44ce6d2b4593931d009ec00769410e76478cc88eab59d1f4
SHA512b7668575cea53280a3d553b18e1ac7670eeafab9f2d48db5d86496722e2b1d5d48a3ac3b1e56a8d7198abd771f2d95fef4449792c214dffc2097e62273e7db1f
-
Filesize
680KB
MD5c20495a19b01f9258ca23d01933ec47e
SHA11642d96fb066baaa592e6b147e7a40cb49aeb2ba
SHA25661c1436f9b48159b56f1f71561626724682d54e1714ec722c76c3b7667f0cbb7
SHA512b84494e422b2231141836a8ef0bbe04e6fd17c189dcbabacd8b3cbfe9dc5b224dfbefa457fb105f147350b45044e7a0363a101fe008e3610aa066bd379d4ed68