Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
rurs.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
rurs.exe
Resource
win10v2004-20240802-en
General
-
Target
rurs.exe
-
Size
1.4MB
-
MD5
7dfdd2e237862c9d60fd49643886afc4
-
SHA1
4a7bd82de5b3f0a3a20d04536611f52f87e3c42f
-
SHA256
a93be364ac6aa354b7ee5160dc3c99248d42947bb871bf1c6211d090ffc5e375
-
SHA512
11a519a0edd586e5df7bdd57dc9e7ceb633eb22adf6b6861da96170ede14c07404878ec4bc22b4c0f13e08ff6a0eb04ee3df20fdbb6d4173cd25491e0e8e28fc
-
SSDEEP
24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aCAoxYwlhQKkhWkW8w7nGjZHd9Cmy:aTvC/MTQYxsWR7aCAAYwltQWkWpyj/R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rurs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2180 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2100 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 2760 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 1956 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 2688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1688 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe 1188 rurs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2100 2180 rurs.exe 31 PID 2180 wrote to memory of 2100 2180 rurs.exe 31 PID 2180 wrote to memory of 2100 2180 rurs.exe 31 PID 2180 wrote to memory of 2100 2180 rurs.exe 31 PID 2100 wrote to memory of 2760 2100 rurs.exe 32 PID 2100 wrote to memory of 2760 2100 rurs.exe 32 PID 2100 wrote to memory of 2760 2100 rurs.exe 32 PID 2100 wrote to memory of 2760 2100 rurs.exe 32 PID 2760 wrote to memory of 1956 2760 rurs.exe 33 PID 2760 wrote to memory of 1956 2760 rurs.exe 33 PID 2760 wrote to memory of 1956 2760 rurs.exe 33 PID 2760 wrote to memory of 1956 2760 rurs.exe 33 PID 1956 wrote to memory of 2688 1956 rurs.exe 34 PID 1956 wrote to memory of 2688 1956 rurs.exe 34 PID 1956 wrote to memory of 2688 1956 rurs.exe 34 PID 1956 wrote to memory of 2688 1956 rurs.exe 34 PID 2688 wrote to memory of 1688 2688 rurs.exe 35 PID 2688 wrote to memory of 1688 2688 rurs.exe 35 PID 2688 wrote to memory of 1688 2688 rurs.exe 35 PID 2688 wrote to memory of 1688 2688 rurs.exe 35 PID 1688 wrote to memory of 1188 1688 rurs.exe 36 PID 1688 wrote to memory of 1188 1688 rurs.exe 36 PID 1688 wrote to memory of 1188 1688 rurs.exe 36 PID 1688 wrote to memory of 1188 1688 rurs.exe 36 PID 1188 wrote to memory of 776 1188 rurs.exe 37 PID 1188 wrote to memory of 776 1188 rurs.exe 37 PID 1188 wrote to memory of 776 1188 rurs.exe 37 PID 1188 wrote to memory of 776 1188 rurs.exe 37 PID 776 wrote to memory of 2712 776 rurs.exe 38 PID 776 wrote to memory of 2712 776 rurs.exe 38 PID 776 wrote to memory of 2712 776 rurs.exe 38 PID 776 wrote to memory of 2712 776 rurs.exe 38 PID 2712 wrote to memory of 1732 2712 rurs.exe 39 PID 2712 wrote to memory of 1732 2712 rurs.exe 39 PID 2712 wrote to memory of 1732 2712 rurs.exe 39 PID 2712 wrote to memory of 1732 2712 rurs.exe 39 PID 1732 wrote to memory of 848 1732 rurs.exe 40 PID 1732 wrote to memory of 848 1732 rurs.exe 40 PID 1732 wrote to memory of 848 1732 rurs.exe 40 PID 1732 wrote to memory of 848 1732 rurs.exe 40 PID 848 wrote to memory of 112 848 rurs.exe 41 PID 848 wrote to memory of 112 848 rurs.exe 41 PID 848 wrote to memory of 112 848 rurs.exe 41 PID 848 wrote to memory of 112 848 rurs.exe 41 PID 112 wrote to memory of 2988 112 rurs.exe 42 PID 112 wrote to memory of 2988 112 rurs.exe 42 PID 112 wrote to memory of 2988 112 rurs.exe 42 PID 112 wrote to memory of 2988 112 rurs.exe 42 PID 2988 wrote to memory of 1040 2988 rurs.exe 43 PID 2988 wrote to memory of 1040 2988 rurs.exe 43 PID 2988 wrote to memory of 1040 2988 rurs.exe 43 PID 2988 wrote to memory of 1040 2988 rurs.exe 43 PID 1040 wrote to memory of 1524 1040 rurs.exe 44 PID 1040 wrote to memory of 1524 1040 rurs.exe 44 PID 1040 wrote to memory of 1524 1040 rurs.exe 44 PID 1040 wrote to memory of 1524 1040 rurs.exe 44 PID 1524 wrote to memory of 1568 1524 rurs.exe 45 PID 1524 wrote to memory of 1568 1524 rurs.exe 45 PID 1524 wrote to memory of 1568 1524 rurs.exe 45 PID 1524 wrote to memory of 1568 1524 rurs.exe 45 PID 1568 wrote to memory of 2380 1568 rurs.exe 46 PID 1568 wrote to memory of 2380 1568 rurs.exe 46 PID 1568 wrote to memory of 2380 1568 rurs.exe 46 PID 1568 wrote to memory of 2380 1568 rurs.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"11⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"14⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"16⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"17⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"18⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"19⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"20⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"21⤵
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"22⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"23⤵
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\rurs.exe"C:\Users\Admin\AppData\Local\Temp\rurs.exe"24⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55be93d31f2c222b3336e6c836bf082bd
SHA107ca165dcd36c94caa3d1e9a5fe777d171439a3b
SHA2569ce23458290c183360d7c1864440c260751b451391bad8875ca9d769a9021d5a
SHA512e3a355ec4f40f5a4aa3def311ef60f3bba943f7a4165d18717567d2406d637c73f4d77d2874f03a2ed9bc2af17b13a87ce98b947fd1cdd1f2f094bb4962ed221
-
Filesize
430KB
MD50258f292bf7517cdb4f5d3148201dd0f
SHA1bd0503a188a81fb84d6e95b1668b9f99ac258a60
SHA2565c9e2046e1b0239d6a2fb164cef4729d5ec73ba5935e7d6d7f967e86a147be5d
SHA51243b8ac2f3f54ba23a25b713faabe0f9361032ad0ab6ac57db22530413787e6aea9c512a3c904afb5d9e9941a5dd603b90c3fa62488f190983b2c891396a04554
-
Filesize
42KB
MD55ecf662db139bc395a53bccad04f43f8
SHA11039734011a4fb1fff5c1958ace702ab699561c2
SHA25646f481c2053aaf34c3f598d40e7855c53c58d69bbd32c6e8d7fc2cf5fb3ce8b4
SHA5125c2cc7ceec13868d183ebf6293a734988c3fdf82b5a5690d6d49f2d67df7769a3a20cdc63a17395f939a2614fba766bc795ed17ae6aaa64af0c0d677e43ac728
-
Filesize
483KB
MD555cea69de3879bbadee9ca12863b0b50
SHA123242310662757b7d375b015cdf300da9f76a3a3
SHA2563d583e4f3dace19c0fd49c728b3f433b006389fda8b2912d852eaa3de80959e3
SHA5122b2afeed69f636fb8054097983b77680833fbe26aadde84b5afbf8f46c5fdd5a1a1ee553a8a881b6a499a024f7c0263c857c58c0d34d42aeb95d570f3938c99c