Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:53

General

  • Target

    14e3bedb83065443f19b1e5bfd91b20f681f8887ed7c1441a25c160c87f34e18.exe

  • Size

    1.3MB

  • MD5

    54206c07a82332c8a41180fa260cf38b

  • SHA1

    d424d36f32690f22d53bd31410f47fa97efec7ab

  • SHA256

    14e3bedb83065443f19b1e5bfd91b20f681f8887ed7c1441a25c160c87f34e18

  • SHA512

    d1273b61571857de1b43158e343a80ea4ccdd03307ad2e917e14b773ec4410aa397b6bf458b387fc705b2b04fe60126b807a3f1a1e7fe12660b86c1267e5fa1d

  • SSDEEP

    24576:pN43s1uw4XvpXWcpWNC3wTRj765jYEkZUZaP4Pd882vu30NIs4jCMtE2+:CsYw4fpm453C65kEkZUAM8szsoE

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14e3bedb83065443f19b1e5bfd91b20f681f8887ed7c1441a25c160c87f34e18.exe
    "C:\Users\Admin\AppData\Local\Temp\14e3bedb83065443f19b1e5bfd91b20f681f8887ed7c1441a25c160c87f34e18.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1316-132-0x0000000000A90000-0x0000000000E67000-memory.dmp

    Filesize

    3.8MB

  • memory/1316-133-0x0000000000A90000-0x0000000000E67000-memory.dmp

    Filesize

    3.8MB

  • memory/1316-134-0x0000000000A90000-0x0000000000E67000-memory.dmp

    Filesize

    3.8MB

  • memory/1316-135-0x0000000000A90000-0x0000000000E67000-memory.dmp

    Filesize

    3.8MB