Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 01:33

General

  • Target

    Rapses.ps1

  • Size

    51KB

  • MD5

    c7b38eb59906350c5320fba41407d4a7

  • SHA1

    2c6b4eda941d4f23d1d5969fc7cf06e689450de8

  • SHA256

    445c94fa7b8c3f9a7a84bc797ff21109431e9fe512b58d5b4e63581138cb0e61

  • SHA512

    f3c52188a2c107f1011ae156bd94c8d2465c1d767a166049b374f1bec023f0b123b185f280a5e3b8787bca065ae69ea8a2945eb68e88be778c202824d670bc19

  • SSDEEP

    1536:8OVz0fE7uE4vtvko03n0rytHgbzgj0nboBKC480B1gRf:zznQkDEyNcE0MBKCO1mf

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Rapses.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2776" "824"
      2⤵
        PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259489387.txt

      Filesize

      1KB

      MD5

      8465065ef345d8352f33b72877504ca0

      SHA1

      58b7602fa51dcf837bf2de000e616ed2440b4f78

      SHA256

      80cce6315e98654708e885f416228571248f779838007d000ef1aaf747059c22

      SHA512

      bda26759971130dc1f01b6ee34436e700545b58a58ec396eb5023a50ec86faeff2d21d650d61ba4ca0963dcaf5efd029d6c660793dad63481bd83868d6ea6008

    • memory/2776-13-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-7-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-14-0x000007FEF49FE000-0x000007FEF49FF000-memory.dmp

      Filesize

      4KB

    • memory/2776-15-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-9-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-10-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-11-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-4-0x000007FEF49FE000-0x000007FEF49FF000-memory.dmp

      Filesize

      4KB

    • memory/2776-23-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-6-0x0000000002450000-0x0000000002458000-memory.dmp

      Filesize

      32KB

    • memory/2776-8-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-16-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-17-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-18-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-19-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-20-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-5-0x000000001B260000-0x000000001B542000-memory.dmp

      Filesize

      2.9MB

    • memory/2776-12-0x000007FEF4740000-0x000007FEF50DD000-memory.dmp

      Filesize

      9.6MB