Analysis
-
max time kernel
152s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 18:27
Static task
static1
Behavioral task
behavioral1
Sample
7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe
Resource
win10v2004-20220414-en
General
-
Target
7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe
-
Size
731KB
-
MD5
f7447783a2122d8716e204dcd863245f
-
SHA1
0b8b6bc7caf1366700be7ff189563858869267a7
-
SHA256
7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a
-
SHA512
4cf0ef5615c40bc9d41a41b46b7490a4b22e958990f9ebb4a11b4528ea4491192a65efd1cd23649402bcbe0b5d0e90e2a43c7045cd971c436f150e252e4ca453
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000002314e-138.dat shurk_stealer behavioral2/files/0x000700000002314e-139.dat shurk_stealer -
Executes dropped EXE 2 IoCs
pid Process 3800 xgxmmsoondersleg.sfx.exe 1856 xgxmmsoondersleg.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation xgxmmsoondersleg.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings 7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 xgxmmsoondersleg.exe 1856 xgxmmsoondersleg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4280 2524 7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe 81 PID 2524 wrote to memory of 4280 2524 7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe 81 PID 2524 wrote to memory of 4280 2524 7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe 81 PID 4280 wrote to memory of 2088 4280 WScript.exe 82 PID 4280 wrote to memory of 2088 4280 WScript.exe 82 PID 4280 wrote to memory of 2088 4280 WScript.exe 82 PID 2088 wrote to memory of 3800 2088 cmd.exe 84 PID 2088 wrote to memory of 3800 2088 cmd.exe 84 PID 2088 wrote to memory of 3800 2088 cmd.exe 84 PID 3800 wrote to memory of 1856 3800 xgxmmsoondersleg.sfx.exe 85 PID 3800 wrote to memory of 1856 3800 xgxmmsoondersleg.sfx.exe 85 PID 3800 wrote to memory of 1856 3800 xgxmmsoondersleg.sfx.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe"C:\Users\Admin\AppData\Local\Temp\7c588bad30254ad265fe472b453699875ff7345ece5f21e3b12135a3712daa3a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bat.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\xgxmmsoondersleg.sfx.exexgxmmsoondersleg.sfx.exe -pxgxmmsoondersleg.exe -dC:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\xgxmmsoondersleg.exe"C:\Users\Admin\AppData\Local\Temp\xgxmmsoondersleg.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD51a8e561b0828f1fe5a03edfe13310422
SHA14660dbeadc2f48caa86ab215ee0d0ba25eb56dd4
SHA256e73edd2e35c984702c3c5221f3ebec10753a0ee4976ce6b4831ec1c25e1c81ba
SHA512555738a5ee3ac433871583dd0dbdcd7239248570c90511dac90f2b811e305ba368368c3161e50b198e207c05157f9c6de44a3bbfcff4cf0cc71258ebd6c3cdfa
-
Filesize
89B
MD5dc06d3c7415f4f6b05272426a63e9fd1
SHA12a148ec726cde2a19222c03ebf2cf48e8a5c171f
SHA256101467d0422de2fafce3dc4e7f28343f7eab7f132a42843a9498b0fe3ffa9093
SHA512d2063eddd861715db497adaf3440fc120aed019aa309ca2010d7b19e26987648c67f590e141df31b7c660cfebb33f052861fa2d1db5017e5f97dd4437155f76a
-
Filesize
502KB
MD56795b8fa91bb7b8b189237849f54a739
SHA163e5067d150dd9974a0dcf2b3ac4001e3a895941
SHA2560bc14dae2f50eded59bf438ffeb1d63784e78d1eb440f9c7420cb134c864da39
SHA51248d5e840308fbe9498439f0e267fd070d086dffe6a24c3bef1b3a4ed0cfbf796ebe57453bb0547a80dfd2bd0a7deb0cffa03a583e61a7f71208f780de52832cc
-
Filesize
502KB
MD56795b8fa91bb7b8b189237849f54a739
SHA163e5067d150dd9974a0dcf2b3ac4001e3a895941
SHA2560bc14dae2f50eded59bf438ffeb1d63784e78d1eb440f9c7420cb134c864da39
SHA51248d5e840308fbe9498439f0e267fd070d086dffe6a24c3bef1b3a4ed0cfbf796ebe57453bb0547a80dfd2bd0a7deb0cffa03a583e61a7f71208f780de52832cc
-
Filesize
568KB
MD5b6e3c4f4de63c41e0a3f809c7ceb7d2c
SHA171c9601cd4fce4bcd3ebd0783e465dcf4ee6d3dc
SHA2569871cad6ed15c3897c608d07b9ec00355b040b8250dd6898a61a9344007bf21a
SHA5124babbf8ea55c97c6287c436816295be25f8bf1cb9622694645b2b7da54aa2dcdb6fabe1ae92a197353bf69c0b12433139c81b2c99c1f55862a55dbc384a45e6c
-
Filesize
568KB
MD5b6e3c4f4de63c41e0a3f809c7ceb7d2c
SHA171c9601cd4fce4bcd3ebd0783e465dcf4ee6d3dc
SHA2569871cad6ed15c3897c608d07b9ec00355b040b8250dd6898a61a9344007bf21a
SHA5124babbf8ea55c97c6287c436816295be25f8bf1cb9622694645b2b7da54aa2dcdb6fabe1ae92a197353bf69c0b12433139c81b2c99c1f55862a55dbc384a45e6c