Analysis
-
max time kernel
174s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
07-03-2022 08:19
Static task
static1
Behavioral task
behavioral1
Sample
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe
Resource
win10v2004-en-20220113
General
-
Target
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe
-
Size
732KB
-
MD5
80a78957acf8c76491ec63b609047c13
-
SHA1
f9baa60988ce6be300184a38903b353d590b6ded
-
SHA256
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb
-
SHA512
3fe59945343eeab85817b03e00a4104458404bd9af7fd467d442ddf8b674365f5b8ddbdca0ca0b1d84a28839b028a9fc6d7efdca664db182544cd6164447cbce
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 2 IoCs
resource yara_rule behavioral2/files/0x0004000000000731-134.dat shurk_stealer behavioral2/files/0x0004000000000731-135.dat shurk_stealer -
Executes dropped EXE 2 IoCs
pid Process 3400 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe 1292 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings 568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1292 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe 1292 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4892 1464 568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe 81 PID 1464 wrote to memory of 4892 1464 568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe 81 PID 1464 wrote to memory of 4892 1464 568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe 81 PID 4892 wrote to memory of 4592 4892 WScript.exe 82 PID 4892 wrote to memory of 4592 4892 WScript.exe 82 PID 4892 wrote to memory of 4592 4892 WScript.exe 82 PID 4592 wrote to memory of 3400 4592 cmd.exe 84 PID 4592 wrote to memory of 3400 4592 cmd.exe 84 PID 4592 wrote to memory of 3400 4592 cmd.exe 84 PID 3400 wrote to memory of 1292 3400 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe 85 PID 3400 wrote to memory of 1292 3400 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe 85 PID 3400 wrote to memory of 1292 3400 SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe"C:\Users\Admin\AppData\Local\Temp\568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bat.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exeSSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.sfx.exe -pSSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe -dC:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe"C:\Users\Admin\AppData\Local\Temp\SSSSSSDpDooqaDKoAFpASDFKpklSAFpsSSsSSS.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
-
-