Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 19:02

General

  • Target

    b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe

  • Size

    25.9MB

  • MD5

    767db863164ec054813a61fc1c469b60

  • SHA1

    cf1f5541ea6fcd245d725b89e4e2309b895ab4f7

  • SHA256

    b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31

  • SHA512

    c723996862f4368555af5cd3435ffc7207e9b7f945369ff543b1de5e527a26bed0cd18389ca64bb95085426b9d7f7d2753b8995de2bcfd02b882ac3f4a4f16ed

  • SSDEEP

    786432:zfzDs7aZXBWhs6cets5XOjehnRLy3f3xfDcgH:zffYavetwmehntyJff

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 11 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
    "C:\Users\Admin\AppData\Local\Temp\b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\ProgramData\start.exe
      "C:\ProgramData\start.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1C87.tmp\1C88.tmp\1C89.bat C:\ProgramData\start.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\ProgramData\Changer.exe
          Changer.exe -pskxLL0100xKKsjXJ19289 -dc:/ProgramData
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of WriteProcessMemory
          PID:2024
          • C:\ProgramData\allSkinsData.exe
            "C:\ProgramData\allSkinsData.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:696
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              6⤵
                PID:1508
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:112
            • C:\ProgramData\InventoryChangerLoader.exe
              "C:\ProgramData\InventoryChangerLoader.exe"
              5⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:468
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 2 & START "" "C:\ProgramData\InventoryChangerLoader.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1176
                • C:\Windows\system32\choice.exe
                  choice /C Y /N /D Y /T 2
                  7⤵
                    PID:2032

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Changer.exe

        Filesize

        25.6MB

        MD5

        432498138f372d6f58fb1ce3838eaab9

        SHA1

        74e5cd939cf140d9ed37ee901d68b2a51e49aa33

        SHA256

        47d02c42b8460c5c7031a32add3cb69ac6950f8f8f613e93a2e956721f42bdd7

        SHA512

        98fbcf36196d41289579aa6383593d85080bfd2e3095c75dcd645aa59a911e3a6ac3f638fa9e0b5649b2d16ed9db29e0f2c3bf9c640838792e63c4ffb14372a0

      • C:\ProgramData\Changer.exe

        Filesize

        25.6MB

        MD5

        432498138f372d6f58fb1ce3838eaab9

        SHA1

        74e5cd939cf140d9ed37ee901d68b2a51e49aa33

        SHA256

        47d02c42b8460c5c7031a32add3cb69ac6950f8f8f613e93a2e956721f42bdd7

        SHA512

        98fbcf36196d41289579aa6383593d85080bfd2e3095c75dcd645aa59a911e3a6ac3f638fa9e0b5649b2d16ed9db29e0f2c3bf9c640838792e63c4ffb14372a0

      • C:\ProgramData\InventoryChangerLoader.exe

        Filesize

        14.2MB

        MD5

        3dd6cc2610355bbd373e371bf73a00e8

        SHA1

        2fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf

        SHA256

        0b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228

        SHA512

        eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6

      • C:\ProgramData\InventoryChangerLoader.exe

        Filesize

        14.2MB

        MD5

        3dd6cc2610355bbd373e371bf73a00e8

        SHA1

        2fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf

        SHA256

        0b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228

        SHA512

        eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6

      • C:\ProgramData\LoaderKernel.dll

        Filesize

        11.0MB

        MD5

        614b24c47864eb18905841b8f5bfbdf8

        SHA1

        13223912fe99576f360b9f97864390accc62ce42

        SHA256

        692fdc37b881f8dc702a7817cc3af83011a5453f2e49ff206749e2503da45db1

        SHA512

        e561e44b471240913237dca0a820dd7a546ea74e44c3f78e472583ac352299391a74a4dc21e6f1b03af48ae6e549f68c8387cf7742fc156b46956b72b6f17e35

      • C:\ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • C:\ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • C:\ProgramData\start.exe

        Filesize

        88KB

        MD5

        9590a44fb19cef257378efe5697e8b0b

        SHA1

        7c6bec1a118adcb4fc2dad41512b94b2577a5a48

        SHA256

        1270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853

        SHA512

        421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247

      • C:\Users\Admin\AppData\Local\Temp\1C87.tmp\1C88.tmp\1C89.bat

        Filesize

        74B

        MD5

        ad1338af912f600aacea8967b518c5cf

        SHA1

        e1a44e009c1f925bce69d423949d1e27670b21f2

        SHA256

        3407436e93523047a207cc6ae8d4eb17cc578b7687e41601b0347e7e42d3ba26

        SHA512

        68147c07bef9aa52bd88375e96cb07984f851cfd31a08e85eb6fa818bc10a6d38c392b4afe02ec25317f5d2d54873ded12dff6a6faf0a24b769db736e3190875

      • \ProgramData\InventoryChangerLoader.exe

        Filesize

        14.2MB

        MD5

        3dd6cc2610355bbd373e371bf73a00e8

        SHA1

        2fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf

        SHA256

        0b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228

        SHA512

        eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6

      • \ProgramData\InventoryChangerLoader.exe

        Filesize

        14.2MB

        MD5

        3dd6cc2610355bbd373e371bf73a00e8

        SHA1

        2fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf

        SHA256

        0b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228

        SHA512

        eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6

      • \ProgramData\InventoryChangerLoader.exe

        Filesize

        14.2MB

        MD5

        3dd6cc2610355bbd373e371bf73a00e8

        SHA1

        2fbaaa9fbbcffe14ce59ff76d3dc362bfb8b3acf

        SHA256

        0b1673433abfcb1257ff9db3c6f4d84cd3637ba9351fdabd889209798da2b228

        SHA512

        eb44ac42d55fddfc1a93f82c8cbf577c7fdef65b2938e0cbcf58630c92cb7b073916906d096970a3a3271a0fcf20fd32c3c9c10788f12820d79a2d28abeafba6

      • \ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • \ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • \ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • \ProgramData\allSkinsData.exe

        Filesize

        1.4MB

        MD5

        9e964d0100dde88172f64ecef8e49299

        SHA1

        e65910e0c60e1c728f59a2004ba2f0d44eb56da9

        SHA256

        22fc083a0dc3b0b7f2275a8097e3a7c60fa6ebdd00ad80a90dcfc03f90e50644

        SHA512

        63c56cdec6bfe0f02bc495cf4636cbb5524affc0af7f3b7802cd90aa59d8eba57eaeb55c6fe0f312e4d61d069c9f3ff0207dca14a60f71dad0f6874464868b49

      • \ProgramData\start.exe

        Filesize

        88KB

        MD5

        9590a44fb19cef257378efe5697e8b0b

        SHA1

        7c6bec1a118adcb4fc2dad41512b94b2577a5a48

        SHA256

        1270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853

        SHA512

        421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247

      • \ProgramData\start.exe

        Filesize

        88KB

        MD5

        9590a44fb19cef257378efe5697e8b0b

        SHA1

        7c6bec1a118adcb4fc2dad41512b94b2577a5a48

        SHA256

        1270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853

        SHA512

        421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247

      • \ProgramData\start.exe

        Filesize

        88KB

        MD5

        9590a44fb19cef257378efe5697e8b0b

        SHA1

        7c6bec1a118adcb4fc2dad41512b94b2577a5a48

        SHA256

        1270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853

        SHA512

        421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247

      • \ProgramData\start.exe

        Filesize

        88KB

        MD5

        9590a44fb19cef257378efe5697e8b0b

        SHA1

        7c6bec1a118adcb4fc2dad41512b94b2577a5a48

        SHA256

        1270bb6be5ccb0754ac42b7362e93de56e10cae6e6ddaa60a77faf63696c5853

        SHA512

        421f80702314165eb1e68dc0698533b9f6b91bdaa2ea8488f6812e84731599d4cb8b80469c962681ea58d20dd46ef34e7efbb1f7badfb0bd3e68cd876d3c2247

      • memory/112-101-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/112-87-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/112-86-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/112-83-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/468-97-0x000000001D237000-0x000000001D256000-memory.dmp

        Filesize

        124KB

      • memory/468-96-0x0000000002260000-0x000000000226A000-memory.dmp

        Filesize

        40KB

      • memory/468-102-0x000000001D237000-0x000000001D256000-memory.dmp

        Filesize

        124KB

      • memory/468-80-0x00000000000D0000-0x0000000001D1A000-memory.dmp

        Filesize

        28.3MB

      • memory/468-90-0x000000001F320000-0x000000001FA0A000-memory.dmp

        Filesize

        6.9MB

      • memory/468-91-0x000000001FA10000-0x00000000200FE000-memory.dmp

        Filesize

        6.9MB

      • memory/468-92-0x0000000002580000-0x00000000025D0000-memory.dmp

        Filesize

        320KB

      • memory/468-93-0x0000000002210000-0x000000000223E000-memory.dmp

        Filesize

        184KB

      • memory/468-94-0x0000000002250000-0x0000000002260000-memory.dmp

        Filesize

        64KB

      • memory/468-95-0x00000000025D0000-0x000000000260A000-memory.dmp

        Filesize

        232KB

      • memory/468-98-0x000000001E410000-0x000000001E4C0000-memory.dmp

        Filesize

        704KB

      • memory/696-82-0x00000000005E0000-0x00000000005FE000-memory.dmp

        Filesize

        120KB

      • memory/696-79-0x00000000009B0000-0x0000000000B24000-memory.dmp

        Filesize

        1.5MB

      • memory/1588-54-0x0000000075661000-0x0000000075663000-memory.dmp

        Filesize

        8KB