Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
11-08-2023 02:28
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20230703-en
General
-
Target
Launcher.exe
-
Size
11.5MB
-
MD5
525eca0e85c3325eca5b5b3cfeacd241
-
SHA1
809ff78b0c5a587672f993c6a15c98bdd36141c3
-
SHA256
9f77929368d4760cdf6a905141622bce67b5c2e13f14b2e12ac8b658108ccdbb
-
SHA512
c815f1393d61e4743317cbbaa2aec8d917e0cc20990b5afa8a5960db703bbbbb1c257d0322d301f15f933cb7a9bf07d7de927663a34420ff892a81ca3227c320
-
SSDEEP
49152:+qRnLGu+sHczMYNYEBBMaS3H5KCKsntU6ZKC9sBcRLr1+ar9SgVfB1LlGrGOjk1s:sug
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2300-56-0x0000000029030000-0x000000002980F000-memory.dmp shurk_stealer behavioral1/memory/2300-55-0x000007FFFF760000-0x000007FFFFFA8000-memory.dmp shurk_stealer -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2180 winhoster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHoster = "C:\\Users\\Admin\\AppData\\Roaming\\WinHoster\\winhoster.exe" winhoster.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.amazonaws.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2296 WMIC.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 HTTP User-Agent header 6 Go-http-client/1.1 HTTP User-Agent header 7 Go-http-client/1.1 HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2296 WMIC.exe Token: SeSecurityPrivilege 2296 WMIC.exe Token: SeTakeOwnershipPrivilege 2296 WMIC.exe Token: SeLoadDriverPrivilege 2296 WMIC.exe Token: SeSystemProfilePrivilege 2296 WMIC.exe Token: SeSystemtimePrivilege 2296 WMIC.exe Token: SeProfSingleProcessPrivilege 2296 WMIC.exe Token: SeIncBasePriorityPrivilege 2296 WMIC.exe Token: SeCreatePagefilePrivilege 2296 WMIC.exe Token: SeBackupPrivilege 2296 WMIC.exe Token: SeRestorePrivilege 2296 WMIC.exe Token: SeShutdownPrivilege 2296 WMIC.exe Token: SeDebugPrivilege 2296 WMIC.exe Token: SeSystemEnvironmentPrivilege 2296 WMIC.exe Token: SeRemoteShutdownPrivilege 2296 WMIC.exe Token: SeUndockPrivilege 2296 WMIC.exe Token: SeManageVolumePrivilege 2296 WMIC.exe Token: 33 2296 WMIC.exe Token: 34 2296 WMIC.exe Token: 35 2296 WMIC.exe Token: SeIncreaseQuotaPrivilege 2296 WMIC.exe Token: SeSecurityPrivilege 2296 WMIC.exe Token: SeTakeOwnershipPrivilege 2296 WMIC.exe Token: SeLoadDriverPrivilege 2296 WMIC.exe Token: SeSystemProfilePrivilege 2296 WMIC.exe Token: SeSystemtimePrivilege 2296 WMIC.exe Token: SeProfSingleProcessPrivilege 2296 WMIC.exe Token: SeIncBasePriorityPrivilege 2296 WMIC.exe Token: SeCreatePagefilePrivilege 2296 WMIC.exe Token: SeBackupPrivilege 2296 WMIC.exe Token: SeRestorePrivilege 2296 WMIC.exe Token: SeShutdownPrivilege 2296 WMIC.exe Token: SeDebugPrivilege 2296 WMIC.exe Token: SeSystemEnvironmentPrivilege 2296 WMIC.exe Token: SeRemoteShutdownPrivilege 2296 WMIC.exe Token: SeUndockPrivilege 2296 WMIC.exe Token: SeManageVolumePrivilege 2296 WMIC.exe Token: 33 2296 WMIC.exe Token: 34 2296 WMIC.exe Token: 35 2296 WMIC.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2096 2300 Launcher.exe 29 PID 2300 wrote to memory of 2096 2300 Launcher.exe 29 PID 2300 wrote to memory of 2096 2300 Launcher.exe 29 PID 2096 wrote to memory of 2296 2096 cmd.exe 31 PID 2096 wrote to memory of 2296 2096 cmd.exe 31 PID 2096 wrote to memory of 2296 2096 cmd.exe 31 PID 2300 wrote to memory of 2844 2300 Launcher.exe 34 PID 2300 wrote to memory of 2844 2300 Launcher.exe 34 PID 2300 wrote to memory of 2844 2300 Launcher.exe 34 PID 2300 wrote to memory of 2180 2300 Launcher.exe 36 PID 2300 wrote to memory of 2180 2300 Launcher.exe 36 PID 2300 wrote to memory of 2180 2300 Launcher.exe 36 PID 2300 wrote to memory of 2180 2300 Launcher.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming/WinHoster2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Users\Admin\AppData\Roaming\WinHoster\winhoster.exeC:\Users\Admin\AppData\Roaming/WinHoster/winhoster.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD539a3b5a48178b860ba3c69dfa191e974
SHA183b1a7f8851aa095b00705c6876ff33419618b80
SHA2560b8e662e7e595ef56396a298c367b74721d66591d856e8a8241fcdd60d08373c
SHA512a131c0866e5afd53ed53cd3b825c1a4b304547283923a33cc722984b147156db0e21c3df1142a353227260dac32cb2e7f136d1a9d93315cc9aa3673bf8602605