Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe
Resource
win10v2004-20230703-en
General
-
Target
108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe
-
Size
7.7MB
-
MD5
78bc9c35531a7e1a31af3bdff4083df6
-
SHA1
a679051cff10c802a126c25c42f12fefac857a31
-
SHA256
108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d
-
SHA512
2a41f758b0da999e3d2afbe4c7f0f5b4d675dc643f866d4947b9570c9b8ccd6bc3ebf44a67c82633ae9992404c1e9a9ba0956712a451446a9e8ddd6fcc1ef526
-
SSDEEP
196608:SdrOnwUbN9pdNqVWEwLnN+HDc/Up7sSpoVmPYYfW/:SVRUb5dN65ON+AMWS6VmlW/
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/3452-134-0x00007FF4A1030000-0x00007FF4A1813000-memory.dmp shurk_stealer -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3056 winhoster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinHoster = "C:\\Users\\Admin\\AppData\\Roaming\\WinHoster\\winhoster.exe" winhoster.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.amazonaws.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1768 WMIC.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 HTTP User-Agent header 10 Go-http-client/1.1 HTTP User-Agent header 13 Go-http-client/1.1 HTTP User-Agent header 15 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 powershell.exe 4748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1768 WMIC.exe Token: SeSecurityPrivilege 1768 WMIC.exe Token: SeTakeOwnershipPrivilege 1768 WMIC.exe Token: SeLoadDriverPrivilege 1768 WMIC.exe Token: SeSystemProfilePrivilege 1768 WMIC.exe Token: SeSystemtimePrivilege 1768 WMIC.exe Token: SeProfSingleProcessPrivilege 1768 WMIC.exe Token: SeIncBasePriorityPrivilege 1768 WMIC.exe Token: SeCreatePagefilePrivilege 1768 WMIC.exe Token: SeBackupPrivilege 1768 WMIC.exe Token: SeRestorePrivilege 1768 WMIC.exe Token: SeShutdownPrivilege 1768 WMIC.exe Token: SeDebugPrivilege 1768 WMIC.exe Token: SeSystemEnvironmentPrivilege 1768 WMIC.exe Token: SeRemoteShutdownPrivilege 1768 WMIC.exe Token: SeUndockPrivilege 1768 WMIC.exe Token: SeManageVolumePrivilege 1768 WMIC.exe Token: 33 1768 WMIC.exe Token: 34 1768 WMIC.exe Token: 35 1768 WMIC.exe Token: 36 1768 WMIC.exe Token: SeIncreaseQuotaPrivilege 1768 WMIC.exe Token: SeSecurityPrivilege 1768 WMIC.exe Token: SeTakeOwnershipPrivilege 1768 WMIC.exe Token: SeLoadDriverPrivilege 1768 WMIC.exe Token: SeSystemProfilePrivilege 1768 WMIC.exe Token: SeSystemtimePrivilege 1768 WMIC.exe Token: SeProfSingleProcessPrivilege 1768 WMIC.exe Token: SeIncBasePriorityPrivilege 1768 WMIC.exe Token: SeCreatePagefilePrivilege 1768 WMIC.exe Token: SeBackupPrivilege 1768 WMIC.exe Token: SeRestorePrivilege 1768 WMIC.exe Token: SeShutdownPrivilege 1768 WMIC.exe Token: SeDebugPrivilege 1768 WMIC.exe Token: SeSystemEnvironmentPrivilege 1768 WMIC.exe Token: SeRemoteShutdownPrivilege 1768 WMIC.exe Token: SeUndockPrivilege 1768 WMIC.exe Token: SeManageVolumePrivilege 1768 WMIC.exe Token: 33 1768 WMIC.exe Token: 34 1768 WMIC.exe Token: 35 1768 WMIC.exe Token: 36 1768 WMIC.exe Token: SeDebugPrivilege 4748 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3452 wrote to memory of 5092 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 83 PID 3452 wrote to memory of 5092 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 83 PID 5092 wrote to memory of 1768 5092 cmd.exe 85 PID 5092 wrote to memory of 1768 5092 cmd.exe 85 PID 3452 wrote to memory of 4748 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 86 PID 3452 wrote to memory of 4748 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 86 PID 3452 wrote to memory of 3056 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 88 PID 3452 wrote to memory of 3056 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 88 PID 3452 wrote to memory of 3056 3452 108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe"C:\Users\Admin\AppData\Local\Temp\108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming/WinHoster2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Users\Admin\AppData\Roaming\WinHoster\winhoster.exeC:\Users\Admin\AppData\Roaming/WinHoster/winhoster.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
185KB
MD539a3b5a48178b860ba3c69dfa191e974
SHA183b1a7f8851aa095b00705c6876ff33419618b80
SHA2560b8e662e7e595ef56396a298c367b74721d66591d856e8a8241fcdd60d08373c
SHA512a131c0866e5afd53ed53cd3b825c1a4b304547283923a33cc722984b147156db0e21c3df1142a353227260dac32cb2e7f136d1a9d93315cc9aa3673bf8602605
-
Filesize
185KB
MD539a3b5a48178b860ba3c69dfa191e974
SHA183b1a7f8851aa095b00705c6876ff33419618b80
SHA2560b8e662e7e595ef56396a298c367b74721d66591d856e8a8241fcdd60d08373c
SHA512a131c0866e5afd53ed53cd3b825c1a4b304547283923a33cc722984b147156db0e21c3df1142a353227260dac32cb2e7f136d1a9d93315cc9aa3673bf8602605