Analysis
-
max time kernel
4294203s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
19-03-2022 21:22
Static task
static1
Behavioral task
behavioral1
Sample
13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe
Resource
win10v2004-en-20220113
General
-
Target
13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe
-
Size
737KB
-
MD5
549ff20a80778cb9367e1bf98950ed2c
-
SHA1
faf24d282d0fe762e9094d77f2c9823490dcc776
-
SHA256
13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309
-
SHA512
6e94a4b95b37ead2cac4dea2a23af5f11e02ae450fded489b5af720615e6c4699723105af20979c5c7cc4b11fab2c10717e668bfa09820681d6d77f0eb91f95b
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 4 IoCs
resource yara_rule behavioral1/files/0x000a0000000122d0-62.dat shurk_stealer behavioral1/files/0x000a0000000122d0-63.dat shurk_stealer behavioral1/files/0x000a0000000122d0-64.dat shurk_stealer behavioral1/files/0x000a0000000122d0-65.dat shurk_stealer -
Executes dropped EXE 2 IoCs
pid Process 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 1656 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.exe -
Loads dropped DLL 4 IoCs
pid Process 1272 cmd.exe 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1656 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 912 wrote to memory of 1460 912 13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe 27 PID 912 wrote to memory of 1460 912 13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe 27 PID 912 wrote to memory of 1460 912 13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe 27 PID 912 wrote to memory of 1460 912 13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe 27 PID 1460 wrote to memory of 1272 1460 WScript.exe 28 PID 1460 wrote to memory of 1272 1460 WScript.exe 28 PID 1460 wrote to memory of 1272 1460 WScript.exe 28 PID 1460 wrote to memory of 1272 1460 WScript.exe 28 PID 1272 wrote to memory of 1428 1272 cmd.exe 30 PID 1272 wrote to memory of 1428 1272 cmd.exe 30 PID 1272 wrote to memory of 1428 1272 cmd.exe 30 PID 1272 wrote to memory of 1428 1272 cmd.exe 30 PID 1428 wrote to memory of 1656 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 31 PID 1428 wrote to memory of 1656 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 31 PID 1428 wrote to memory of 1656 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 31 PID 1428 wrote to memory of 1656 1428 SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe"C:\Users\Admin\AppData\Local\Temp\13624ffe8cd64d5c30602bf57f83245235e251ba2f92d81a7f7c2d1530c5a309.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bat.bat3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exeSSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.sfx.exe -pSSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.exe -dC:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.exe"C:\Users\Admin\AppData\Local\Temp\SSFoprOgoFejFkSGjDDsSSSsSFPgoSjAgVN.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
-
-