Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:39

General

  • Target

    32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe

  • Size

    1.4MB

  • MD5

    e5a2f33bf1dcf4b148c6f5b8c7ce4787

  • SHA1

    737ba1592b57cb560ed7b39f4a1768aaa1cf6f95

  • SHA256

    32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d

  • SHA512

    04b2a8c0c555c86b8e89162640261d0145dcbb6099837ef5ca54674b2fabc96678c08031c76e048faf76b34fc55e8e3aba69aa4bd514e4af127777a8ae4e03f7

  • SSDEEP

    24576:pS2hmTmzlaucQl+FSx3/qhsdFTKrPiBSxiT2nUhtjQv53a5qPtSR:p1NX8F0H6iAxiThPQhq5qVSR

Score
10/10

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe
    "C:\Users\Admin\AppData\Local\Temp\32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3008-132-0x0000000000500000-0x0000000000660000-memory.dmp

    Filesize

    1.4MB

  • memory/3008-133-0x0000000005610000-0x0000000005BB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3008-134-0x0000000005060000-0x00000000050F2000-memory.dmp

    Filesize

    584KB

  • memory/3008-135-0x0000000005020000-0x000000000502A000-memory.dmp

    Filesize

    40KB

  • memory/3380-137-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3380-139-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3380-140-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3380-141-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3380-142-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB