Analysis

  • max time kernel
    127s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2023 16:42

General

  • Target

    06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe

  • Size

    8.7MB

  • MD5

    06ff4ba1d0eec6c08d4b283d89f64f93

  • SHA1

    b5a6e9e2e5437fa03ec1f83fbce3675c9a1a5c50

  • SHA256

    1c6287821da0fb2fbc21f358cdc1aaed64d3ded4faf35749c0b38e9e37b6a017

  • SHA512

    c8f46a046c22433865aa2d4ecd66621624af82560f895e2daa0d82f46e1bcb238de0ba8fcb9a88558dc6e7778d447f0e7ccb6c15e7a3960b444c07e3b2bae6fe

  • SSDEEP

    196608:WBtayDqb6tgVatfRTYSrZtoagFwReADF6GnH+nX9cY1xyaD:WBtCetFtfBrLzDF62eNbQaD

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\06ff4ba1d0eec6c08d4b283d89f64f93_magniber_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic path win32_VideoController get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic path win32_VideoController get name
        3⤵
        • Detects videocard installed
        • Suspicious use of AdjustPrivilegeToken
        PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1608-133-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-134-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-135-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-136-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-137-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-138-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-139-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-141-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/1608-140-0x00000000FF140000-0x00000000FF92A000-memory.dmp

    Filesize

    7.9MB

  • memory/1608-143-0x0000000004800000-0x0000000004FB2000-memory.dmp

    Filesize

    7.7MB

  • memory/1608-160-0x0000000077A70000-0x0000000077B60000-memory.dmp

    Filesize

    960KB

  • memory/1608-161-0x0000000004800000-0x0000000004FB2000-memory.dmp

    Filesize

    7.7MB