Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 23:57

General

  • Target

    rurs.exe

  • Size

    1.4MB

  • MD5

    7dfdd2e237862c9d60fd49643886afc4

  • SHA1

    4a7bd82de5b3f0a3a20d04536611f52f87e3c42f

  • SHA256

    a93be364ac6aa354b7ee5160dc3c99248d42947bb871bf1c6211d090ffc5e375

  • SHA512

    11a519a0edd586e5df7bdd57dc9e7ceb633eb22adf6b6861da96170ede14c07404878ec4bc22b4c0f13e08ff6a0eb04ee3df20fdbb6d4173cd25491e0e8e28fc

  • SSDEEP

    24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aCAoxYwlhQKkhWkW8w7nGjZHd9Cmy:aTvC/MTQYxsWR7aCAAYwltQWkWpyj/R

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rurs.exe
    "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\rurs.exe
      "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\rurs.exe
        "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\AppData\Local\Temp\rurs.exe
          "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Users\Admin\AppData\Local\Temp\rurs.exe
            "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Users\Admin\AppData\Local\Temp\rurs.exe
              "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1688
              • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1188
                • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                  "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:776
                  • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                    "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2712
                    • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                      "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1732
                      • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                        "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:848
                        • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                          "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                          12⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:112
                          • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                            "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                            13⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:2988
                            • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                              "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                              14⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:1040
                              • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                15⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:1524
                                • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                  "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                  16⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:1568
                                  • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                    "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2380
                                    • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                      "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1672
                                      • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                        "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1600
                                        • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                          "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                          20⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2992
                                          • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                            "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2620
                                            • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                              "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2808
                                              • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                                "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2736
                                                • C:\Users\Admin\AppData\Local\Temp\rurs.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\rurs.exe"
                                                  24⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Keily

    Filesize

    84KB

    MD5

    5be93d31f2c222b3336e6c836bf082bd

    SHA1

    07ca165dcd36c94caa3d1e9a5fe777d171439a3b

    SHA256

    9ce23458290c183360d7c1864440c260751b451391bad8875ca9d769a9021d5a

    SHA512

    e3a355ec4f40f5a4aa3def311ef60f3bba943f7a4165d18717567d2406d637c73f4d77d2874f03a2ed9bc2af17b13a87ce98b947fd1cdd1f2f094bb4962ed221

  • C:\Users\Admin\AppData\Local\Temp\aut2B83.tmp

    Filesize

    430KB

    MD5

    0258f292bf7517cdb4f5d3148201dd0f

    SHA1

    bd0503a188a81fb84d6e95b1668b9f99ac258a60

    SHA256

    5c9e2046e1b0239d6a2fb164cef4729d5ec73ba5935e7d6d7f967e86a147be5d

    SHA512

    43b8ac2f3f54ba23a25b713faabe0f9361032ad0ab6ac57db22530413787e6aea9c512a3c904afb5d9e9941a5dd603b90c3fa62488f190983b2c891396a04554

  • C:\Users\Admin\AppData\Local\Temp\aut2BA3.tmp

    Filesize

    42KB

    MD5

    5ecf662db139bc395a53bccad04f43f8

    SHA1

    1039734011a4fb1fff5c1958ace702ab699561c2

    SHA256

    46f481c2053aaf34c3f598d40e7855c53c58d69bbd32c6e8d7fc2cf5fb3ce8b4

    SHA512

    5c2cc7ceec13868d183ebf6293a734988c3fdf82b5a5690d6d49f2d67df7769a3a20cdc63a17395f939a2614fba766bc795ed17ae6aaa64af0c0d677e43ac728

  • C:\Users\Admin\AppData\Local\Temp\uppishly

    Filesize

    483KB

    MD5

    55cea69de3879bbadee9ca12863b0b50

    SHA1

    23242310662757b7d375b015cdf300da9f76a3a3

    SHA256

    3d583e4f3dace19c0fd49c728b3f433b006389fda8b2912d852eaa3de80959e3

    SHA512

    2b2afeed69f636fb8054097983b77680833fbe26aadde84b5afbf8f46c5fdd5a1a1ee553a8a881b6a499a024f7c0263c857c58c0d34d42aeb95d570f3938c99c

  • memory/2180-11-0x00000000000B0000-0x00000000000B4000-memory.dmp

    Filesize

    16KB