Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
9aa17d9ab2b1819c1ec113a20d4f776e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9aa17d9ab2b1819c1ec113a20d4f776e.exe
Resource
win10v2004-20231215-en
General
-
Target
9aa17d9ab2b1819c1ec113a20d4f776e.exe
-
Size
371KB
-
MD5
9aa17d9ab2b1819c1ec113a20d4f776e
-
SHA1
06b1b4435df099fbec480cfcd7a11828be756902
-
SHA256
77f8baaeaf504f6e72a5f8698297e9cccd4f3b13d6848a746a9f3b1cfe95e0bc
-
SHA512
eec24fdc836359f00a8fcb90a8e98ead820fdf32a1e09728fb36f8ea5ad1eaa9aed04c50341a537eec74c9c5469465b9f42d07497c52f3b47e7dfb9f70e6ac84
-
SSDEEP
6144:k9RANfViL+L0tKHNLlbUH4hbP2DsEVhVL5u1uz/QyY830vaBr:IANfVG+L6Kt2HSbuDs2zdu1IdYcQa
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\desktop.ini 9aa17d9ab2b1819c1ec113a20d4f776e.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Desktop.ini 9aa17d9ab2b1819c1ec113a20d4f776e.exe File created C:\Users\Admin\AppData\Local\Temp\desktop.ini 9aa17d9ab2b1819c1ec113a20d4f776e.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\autorun.inf 9aa17d9ab2b1819c1ec113a20d4f776e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD59aa17d9ab2b1819c1ec113a20d4f776e
SHA106b1b4435df099fbec480cfcd7a11828be756902
SHA25677f8baaeaf504f6e72a5f8698297e9cccd4f3b13d6848a746a9f3b1cfe95e0bc
SHA512eec24fdc836359f00a8fcb90a8e98ead820fdf32a1e09728fb36f8ea5ad1eaa9aed04c50341a537eec74c9c5469465b9f42d07497c52f3b47e7dfb9f70e6ac84