Analysis
-
max time kernel
127s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe
-
Size
8.7MB
-
MD5
06ff4ba1d0eec6c08d4b283d89f64f93
-
SHA1
b5a6e9e2e5437fa03ec1f83fbce3675c9a1a5c50
-
SHA256
1c6287821da0fb2fbc21f358cdc1aaed64d3ded4faf35749c0b38e9e37b6a017
-
SHA512
c8f46a046c22433865aa2d4ecd66621624af82560f895e2daa0d82f46e1bcb238de0ba8fcb9a88558dc6e7778d447f0e7ccb6c15e7a3960b444c07e3b2bae6fe
-
SSDEEP
196608:WBtayDqb6tgVatfRTYSrZtoagFwReADF6GnH+nX9cY1xyaD:WBtCetFtfBrLzDF62eNbQaD
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1608-140-0x00000000FF140000-0x00000000FF92A000-memory.dmp shurk_stealer behavioral2/memory/1608-143-0x0000000004800000-0x0000000004FB2000-memory.dmp shurk_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.amazonaws.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1568 WMIC.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 HTTP User-Agent header 10 Go-http-client/1.1 HTTP User-Agent header 20 Go-http-client/1.1 -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1568 WMIC.exe Token: SeSecurityPrivilege 1568 WMIC.exe Token: SeTakeOwnershipPrivilege 1568 WMIC.exe Token: SeLoadDriverPrivilege 1568 WMIC.exe Token: SeSystemProfilePrivilege 1568 WMIC.exe Token: SeSystemtimePrivilege 1568 WMIC.exe Token: SeProfSingleProcessPrivilege 1568 WMIC.exe Token: SeIncBasePriorityPrivilege 1568 WMIC.exe Token: SeCreatePagefilePrivilege 1568 WMIC.exe Token: SeBackupPrivilege 1568 WMIC.exe Token: SeRestorePrivilege 1568 WMIC.exe Token: SeShutdownPrivilege 1568 WMIC.exe Token: SeDebugPrivilege 1568 WMIC.exe Token: SeSystemEnvironmentPrivilege 1568 WMIC.exe Token: SeRemoteShutdownPrivilege 1568 WMIC.exe Token: SeUndockPrivilege 1568 WMIC.exe Token: SeManageVolumePrivilege 1568 WMIC.exe Token: 33 1568 WMIC.exe Token: 34 1568 WMIC.exe Token: 35 1568 WMIC.exe Token: 36 1568 WMIC.exe Token: SeIncreaseQuotaPrivilege 1568 WMIC.exe Token: SeSecurityPrivilege 1568 WMIC.exe Token: SeTakeOwnershipPrivilege 1568 WMIC.exe Token: SeLoadDriverPrivilege 1568 WMIC.exe Token: SeSystemProfilePrivilege 1568 WMIC.exe Token: SeSystemtimePrivilege 1568 WMIC.exe Token: SeProfSingleProcessPrivilege 1568 WMIC.exe Token: SeIncBasePriorityPrivilege 1568 WMIC.exe Token: SeCreatePagefilePrivilege 1568 WMIC.exe Token: SeBackupPrivilege 1568 WMIC.exe Token: SeRestorePrivilege 1568 WMIC.exe Token: SeShutdownPrivilege 1568 WMIC.exe Token: SeDebugPrivilege 1568 WMIC.exe Token: SeSystemEnvironmentPrivilege 1568 WMIC.exe Token: SeRemoteShutdownPrivilege 1568 WMIC.exe Token: SeUndockPrivilege 1568 WMIC.exe Token: SeManageVolumePrivilege 1568 WMIC.exe Token: 33 1568 WMIC.exe Token: 34 1568 WMIC.exe Token: 35 1568 WMIC.exe Token: 36 1568 WMIC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3672 1608 06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe 83 PID 1608 wrote to memory of 3672 1608 06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe 83 PID 1608 wrote to memory of 3672 1608 06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe 83 PID 3672 wrote to memory of 1568 3672 cmd.exe 85 PID 3672 wrote to memory of 1568 3672 cmd.exe 85 PID 3672 wrote to memory of 1568 3672 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-