Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
Resource
win10v2004-20221111-en
General
-
Target
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
-
Size
25.9MB
-
MD5
767db863164ec054813a61fc1c469b60
-
SHA1
cf1f5541ea6fcd245d725b89e4e2309b895ab4f7
-
SHA256
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31
-
SHA512
c723996862f4368555af5cd3435ffc7207e9b7f945369ff543b1de5e527a26bed0cd18389ca64bb95085426b9d7f7d2753b8995de2bcfd02b882ac3f4a4f16ed
-
SSDEEP
786432:zfzDs7aZXBWhs6cets5XOjehnRLy3f3xfDcgH:zffYavetwmehntyJff
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/112-83-0x0000000000400000-0x000000000047F000-memory.dmp shurk_stealer behavioral1/memory/112-84-0x00000000004494F1-mapping.dmp shurk_stealer behavioral1/memory/112-86-0x0000000000400000-0x000000000047F000-memory.dmp shurk_stealer behavioral1/memory/112-87-0x0000000000400000-0x000000000047F000-memory.dmp shurk_stealer behavioral1/memory/112-101-0x0000000000400000-0x000000000047F000-memory.dmp shurk_stealer -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1396 start.exe 2024 Changer.exe 696 allSkinsData.exe 468 InventoryChangerLoader.exe -
resource yara_rule behavioral1/files/0x0008000000013402-77.dat vmprotect behavioral1/files/0x0008000000013402-75.dat vmprotect behavioral1/files/0x0008000000013402-78.dat vmprotect behavioral1/memory/468-80-0x00000000000D0000-0x0000000001D1A000-memory.dmp vmprotect behavioral1/files/0x0008000000013402-99.dat vmprotect behavioral1/files/0x0008000000013402-100.dat vmprotect behavioral1/files/0x0007000000013494-103.dat vmprotect -
Loads dropped DLL 11 IoCs
pid Process 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 2024 Changer.exe 2024 Changer.exe 2024 Changer.exe 2024 Changer.exe 2024 Changer.exe 1208 Process not Found 1208 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 112 696 allSkinsData.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 InventoryChangerLoader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 InventoryChangerLoader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 InventoryChangerLoader.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2024 Changer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 112 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 696 allSkinsData.exe Token: SeDebugPrivilege 468 InventoryChangerLoader.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1396 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 27 PID 1588 wrote to memory of 1396 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 27 PID 1588 wrote to memory of 1396 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 27 PID 1588 wrote to memory of 1396 1588 b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe 27 PID 1396 wrote to memory of 1224 1396 start.exe 29 PID 1396 wrote to memory of 1224 1396 start.exe 29 PID 1396 wrote to memory of 1224 1396 start.exe 29 PID 1396 wrote to memory of 1224 1396 start.exe 29 PID 1224 wrote to memory of 2024 1224 cmd.exe 30 PID 1224 wrote to memory of 2024 1224 cmd.exe 30 PID 1224 wrote to memory of 2024 1224 cmd.exe 30 PID 1224 wrote to memory of 2024 1224 cmd.exe 30 PID 2024 wrote to memory of 696 2024 Changer.exe 31 PID 2024 wrote to memory of 696 2024 Changer.exe 31 PID 2024 wrote to memory of 696 2024 Changer.exe 31 PID 2024 wrote to memory of 696 2024 Changer.exe 31 PID 2024 wrote to memory of 468 2024 Changer.exe 32 PID 2024 wrote to memory of 468 2024 Changer.exe 32 PID 2024 wrote to memory of 468 2024 Changer.exe 32 PID 2024 wrote to memory of 468 2024 Changer.exe 32 PID 696 wrote to memory of 1508 696 allSkinsData.exe 33 PID 696 wrote to memory of 1508 696 allSkinsData.exe 33 PID 696 wrote to memory of 1508 696 allSkinsData.exe 33 PID 696 wrote to memory of 1508 696 allSkinsData.exe 33 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 696 wrote to memory of 112 696 allSkinsData.exe 34 PID 468 wrote to memory of 1176 468 InventoryChangerLoader.exe 35 PID 468 wrote to memory of 1176 468 InventoryChangerLoader.exe 35 PID 468 wrote to memory of 1176 468 InventoryChangerLoader.exe 35 PID 1176 wrote to memory of 2032 1176 cmd.exe 37 PID 1176 wrote to memory of 2032 1176 cmd.exe 37 PID 1176 wrote to memory of 2032 1176 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe"C:\Users\Admin\AppData\Local\Temp\b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\ProgramData\start.exe"C:\ProgramData\start.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1C87.tmp\1C88.tmp\1C89.bat C:\ProgramData\start.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\ProgramData\Changer.exeChanger.exe -pskxLL0100xKKsjXJ19289 -dc:/ProgramData4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\ProgramData\allSkinsData.exe"C:\ProgramData\allSkinsData.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe6⤵PID:1508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe6⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
-
C:\ProgramData\InventoryChangerLoader.exe"C:\ProgramData\InventoryChangerLoader.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 2 & START "" "C:\ProgramData\InventoryChangerLoader.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 27⤵PID:2032
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.6MB
MD5432498138f372d6f58fb1ce3838eaab9
SHA174e5cd939cf140d9ed37ee901d68b2a51e49aa33
SHA25647d02c42b8460c5c7031a32add3cb69ac6950f8f8f613e93a2e956721f42bdd7
SHA51298fbcf36196d41289579aa6383593d85080bfd2e3095c75dcd645aa59a911e3a6ac3f638fa9e0b5649b2d16ed9db29e0f2c3bf9c640838792e63c4ffb14372a0
-
Filesize
25.6MB
MD5432498138f372d6f58fb1ce3838eaab9
SHA174e5cd939cf140d9ed37ee901d68b2a51e49aa33
SHA25647d02c42b8460c5c7031a32add3cb69ac6950f8f8f613e93a2e956721f42bdd7
SHA51298fbcf36196d41289579aa6383593d85080bfd2e3095c75dcd645aa59a911e3a6ac3f638fa9e0b5649b2d16ed9db29e0f2c3bf9c640838792e63c4ffb14372a0
-
Filesize
14.2MB
MD53dd6cc2610355bbd373e371bf73a00e8
SHA12fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf
SHA2560b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228
SHA512eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6
-
Filesize
14.2MB
MD53dd6cc2610355bbd373e371bf73a00e8
SHA12fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf
SHA2560b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228
SHA512eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6
-
Filesize
11.0MB
MD5614b24c47864eb18905841b8f5bfbdf8
SHA113223912fe99576f360b9f97864390accc62ce42
SHA256692fdc37b881f8dc702a7817cc3af83011a5453f2e49ff206749e2503da45db1
SHA512e561e44b471240913237dca0a820dd7a546ea74e44c3f78e472583ac352299391a74a4dc21e6f1b03af48ae6e549f68c8387cf7742fc156b46956b72b6f17e35
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
88KB
MD59590a44fb19cef257378efe5697e8b0b
SHA17c6bec1a118adcb4fc2dad41512b94b2577a5a48
SHA2561270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853
SHA512421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247
-
Filesize
74B
MD5ad1338af912f600aacea8967b518c5cf
SHA1e1a44e009c1f925bce69d423949d1e27670b21f2
SHA2563407436e93523047a207cc6ae8d4eb17cc578b7687e41601b0347e7e42d3ba26
SHA51268147c07bef9aa52bd88375e96cb07984f851cfd31a08e85eb6fa818bc10a6d38c392b4afe02ec25317f5d2d54873ded12dff6a6faf0a24b769db736e3190875
-
Filesize
14.2MB
MD53dd6cc2610355bbd373e371bf73a00e8
SHA12fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf
SHA2560b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228
SHA512eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6
-
Filesize
14.2MB
MD53dd6cc2610355bbd373e371bf73a00e8
SHA12fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf
SHA2560b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228
SHA512eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6
-
Filesize
14.2MB
MD53dd6cc2610355bbd373e371bf73a00e8
SHA12fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf
SHA2560b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228
SHA512eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
1.4MB
MD59e964d0100dde88172f64ecef8e49299
SHA1e65910e0c60e1c728f59a2004ba2f0d44eb56da9
SHA25622fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644
SHA51263c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49
-
Filesize
88KB
MD59590a44fb19cef257378efe5697e8b0b
SHA17c6bec1a118adcb4fc2dad41512b94b2577a5a48
SHA2561270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853
SHA512421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247
-
Filesize
88KB
MD59590a44fb19cef257378efe5697e8b0b
SHA17c6bec1a118adcb4fc2dad41512b94b2577a5a48
SHA2561270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853
SHA512421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247
-
Filesize
88KB
MD59590a44fb19cef257378efe5697e8b0b
SHA17c6bec1a118adcb4fc2dad41512b94b2577a5a48
SHA2561270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853
SHA512421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247
-
Filesize
88KB
MD59590a44fb19cef257378efe5697e8b0b
SHA17c6bec1a118adcb4fc2dad41512b94b2577a5a48
SHA2561270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853
SHA512421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247