Analysis
-
max time kernel
160s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 19:05
Static task
static1
Behavioral task
behavioral1
Sample
30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe
Resource
win10v2004-20220414-en
General
-
Target
30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe
-
Size
731KB
-
MD5
28874004a01799ba8395ce196e6cb0e0
-
SHA1
7837f1be070ce7a7f857a2eb225818780fd4a420
-
SHA256
30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09
-
SHA512
7bbfb6c523433b329b765a355f62d2df20c44ffd1cb4472a5674050867c77b45bc086102e25c3e3b6112a2477a9cb1ac0a10fb0b4fa186438557919c0438856b
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000002314e-139.dat shurk_stealer behavioral2/files/0x000700000002314e-138.dat shurk_stealer -
Executes dropped EXE 2 IoCs
pid Process 424 xellonewyoousrbeen.sfx.exe 4056 xellonewyoousrbeen.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation xellonewyoousrbeen.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings 30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4056 xellonewyoousrbeen.exe 4056 xellonewyoousrbeen.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4416 2524 30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe 80 PID 2524 wrote to memory of 4416 2524 30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe 80 PID 2524 wrote to memory of 4416 2524 30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe 80 PID 4416 wrote to memory of 4288 4416 WScript.exe 81 PID 4416 wrote to memory of 4288 4416 WScript.exe 81 PID 4416 wrote to memory of 4288 4416 WScript.exe 81 PID 4288 wrote to memory of 424 4288 cmd.exe 84 PID 4288 wrote to memory of 424 4288 cmd.exe 84 PID 4288 wrote to memory of 424 4288 cmd.exe 84 PID 424 wrote to memory of 4056 424 xellonewyoousrbeen.sfx.exe 85 PID 424 wrote to memory of 4056 424 xellonewyoousrbeen.sfx.exe 85 PID 424 wrote to memory of 4056 424 xellonewyoousrbeen.sfx.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe"C:\Users\Admin\AppData\Local\Temp\30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bat.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\xellonewyoousrbeen.sfx.exexellonewyoousrbeen.sfx.exe -pxellonewyoousrbeen.exe -dC:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\xellonewyoousrbeen.exe"C:\Users\Admin\AppData\Local\Temp\xellonewyoousrbeen.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5844274e64901102c45cd598a44d1d508
SHA107494226d0b4a605efc70591f2f5f71f3b287290
SHA2562c0e210ec3bc7d33ee34deba20b867af0c356d2197120f38bdfc900fa11774a0
SHA5126139d853208d61dff115334f1535994809c1f79f280efbc42146bf39f39ca7c97fd8346c9a004d59c186f1c524341ad02b516465f2fc52b5fcdee766978834d8
-
Filesize
89B
MD5dc06d3c7415f4f6b05272426a63e9fd1
SHA12a148ec726cde2a19222c03ebf2cf48e8a5c171f
SHA256101467d0422de2fafce3dc4e7f28343f7eab7f132a42843a9498b0fe3ffa9093
SHA512d2063eddd861715db497adaf3440fc120aed019aa309ca2010d7b19e26987648c67f590e141df31b7c660cfebb33f052861fa2d1db5017e5f97dd4437155f76a
-
Filesize
502KB
MD520a45d03d0efda64d3a550e13bdf659a
SHA1239d865f85e2219706f6ae0525004755b8c6384c
SHA256007a9b733ce579e9edb273813a12c269dd0807a335fffb4e584bab95115dd07e
SHA512e24c1687a462b78a5431273b51fdcb96800f71f855fada47e822527acbf025f98a825648f79cc801e79b408078da59b00bd384d45070fd6664027e1eb46fdd2e
-
Filesize
502KB
MD520a45d03d0efda64d3a550e13bdf659a
SHA1239d865f85e2219706f6ae0525004755b8c6384c
SHA256007a9b733ce579e9edb273813a12c269dd0807a335fffb4e584bab95115dd07e
SHA512e24c1687a462b78a5431273b51fdcb96800f71f855fada47e822527acbf025f98a825648f79cc801e79b408078da59b00bd384d45070fd6664027e1eb46fdd2e
-
Filesize
567KB
MD5c4ebee4e09dc7b5e8fe89ec368d8b13b
SHA13230b20e94cc8be564d16c12a6a9db6d2b0ad13d
SHA256c5e5c5e17d79791742fa5be8c120eee740da1579c4083c10afeb63c2181ae161
SHA512e4785e273f88677a2ba39af3cf755a13523881ccfbb3ad1c31da1437f19853b4f50b9bdc15891bb1029e69e92b05ed57f6d50368ffc1b02143402cac990f5c3b
-
Filesize
567KB
MD5c4ebee4e09dc7b5e8fe89ec368d8b13b
SHA13230b20e94cc8be564d16c12a6a9db6d2b0ad13d
SHA256c5e5c5e17d79791742fa5be8c120eee740da1579c4083c10afeb63c2181ae161
SHA512e4785e273f88677a2ba39af3cf755a13523881ccfbb3ad1c31da1437f19853b4f50b9bdc15891bb1029e69e92b05ed57f6d50368ffc1b02143402cac990f5c3b