Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe
Resource
win10v2004-20230703-en
General
-
Target
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe
-
Size
16.9MB
-
MD5
a2003bd97dc1213350922c80f30c1993
-
SHA1
4d69ba16bf5b456fd0f30bda7d4ca2f4acfc29d3
-
SHA256
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44
-
SHA512
73c6da611f124e6b31492ff9d25f6691d79d74596aeb7e877a6993d171b5b2715f536f3f965bbccc770472f02459e16f759f6ddb219a81410d1b86413aa871f1
-
SSDEEP
393216:0TQvE3PLny7Xq+4E0ZLlW3rBAtTkuk8LyKa1y3:0uQby7X/dALUVAz4n1
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4412-134-0x0000000140000000-0x0000000140836000-memory.dmp shurk_stealer behavioral2/memory/4412-148-0x000001325F0D0000-0x000001326017E000-memory.dmp shurk_stealer behavioral2/memory/4412-149-0x0000000140000000-0x0000000140836000-memory.dmp shurk_stealer behavioral2/memory/4412-150-0x0000000140000000-0x0000000140836000-memory.dmp shurk_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.amazonaws.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5080 WMIC.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 16 Go-http-client/1.1 HTTP User-Agent header 19 Go-http-client/1.1 -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5080 WMIC.exe Token: SeSecurityPrivilege 5080 WMIC.exe Token: SeTakeOwnershipPrivilege 5080 WMIC.exe Token: SeLoadDriverPrivilege 5080 WMIC.exe Token: SeSystemProfilePrivilege 5080 WMIC.exe Token: SeSystemtimePrivilege 5080 WMIC.exe Token: SeProfSingleProcessPrivilege 5080 WMIC.exe Token: SeIncBasePriorityPrivilege 5080 WMIC.exe Token: SeCreatePagefilePrivilege 5080 WMIC.exe Token: SeBackupPrivilege 5080 WMIC.exe Token: SeRestorePrivilege 5080 WMIC.exe Token: SeShutdownPrivilege 5080 WMIC.exe Token: SeDebugPrivilege 5080 WMIC.exe Token: SeSystemEnvironmentPrivilege 5080 WMIC.exe Token: SeRemoteShutdownPrivilege 5080 WMIC.exe Token: SeUndockPrivilege 5080 WMIC.exe Token: SeManageVolumePrivilege 5080 WMIC.exe Token: 33 5080 WMIC.exe Token: 34 5080 WMIC.exe Token: 35 5080 WMIC.exe Token: 36 5080 WMIC.exe Token: SeIncreaseQuotaPrivilege 5080 WMIC.exe Token: SeSecurityPrivilege 5080 WMIC.exe Token: SeTakeOwnershipPrivilege 5080 WMIC.exe Token: SeLoadDriverPrivilege 5080 WMIC.exe Token: SeSystemProfilePrivilege 5080 WMIC.exe Token: SeSystemtimePrivilege 5080 WMIC.exe Token: SeProfSingleProcessPrivilege 5080 WMIC.exe Token: SeIncBasePriorityPrivilege 5080 WMIC.exe Token: SeCreatePagefilePrivilege 5080 WMIC.exe Token: SeBackupPrivilege 5080 WMIC.exe Token: SeRestorePrivilege 5080 WMIC.exe Token: SeShutdownPrivilege 5080 WMIC.exe Token: SeDebugPrivilege 5080 WMIC.exe Token: SeSystemEnvironmentPrivilege 5080 WMIC.exe Token: SeRemoteShutdownPrivilege 5080 WMIC.exe Token: SeUndockPrivilege 5080 WMIC.exe Token: SeManageVolumePrivilege 5080 WMIC.exe Token: 33 5080 WMIC.exe Token: 34 5080 WMIC.exe Token: 35 5080 WMIC.exe Token: 36 5080 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4220 4412 a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe 88 PID 4412 wrote to memory of 4220 4412 a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe 88 PID 4220 wrote to memory of 5080 4220 cmd.exe 89 PID 4220 wrote to memory of 5080 4220 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe"C:\Users\Admin\AppData\Local\Temp\a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-