Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 13:31

General

  • Target

    Rapses.ps1

  • Size

    51KB

  • MD5

    c7b38eb59906350c5320fba41407d4a7

  • SHA1

    2c6b4eda941d4f23d1d5969fc7cf06e689450de8

  • SHA256

    445c94fa7b8c3f9a7a84bc797ff21109431e9fe512b58d5b4e63581138cb0e61

  • SHA512

    f3c52188a2c107f1011ae156bd94c8d2465c1d767a166049b374f1bec023f0b123b185f280a5e3b8787bca065ae69ea8a2945eb68e88be778c202824d670bc19

  • SSDEEP

    1536:8OVz0fE7uE4vtvko03n0rytHgbzgj0nboBKC480B1gRf:zznQkDEyNcE0MBKCO1mf

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Rapses.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2364" "860"
      2⤵
        PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259440044.txt

      Filesize

      1KB

      MD5

      7a3a001c1945eb875c323b398c229d29

      SHA1

      64ecf87d6e9cd4be399b3e9f1f733227e37fbd95

      SHA256

      e6fff208a4ee310ea96843b2fb0d55e789c6fac8244d6938a232bd4ee99b137a

      SHA512

      8c06a1949bcdcc95bdbc989336e08f30f25aeb1ac84295b4226bbfb63a30fc612638dbef3a7244d11d2764536f0457f53f0d73841fed150465bd0bd9e099dfac

    • memory/2364-4-0x000007FEF5CAE000-0x000007FEF5CAF000-memory.dmp

      Filesize

      4KB

    • memory/2364-5-0x000000001B620000-0x000000001B902000-memory.dmp

      Filesize

      2.9MB

    • memory/2364-6-0x0000000002710000-0x0000000002718000-memory.dmp

      Filesize

      32KB

    • memory/2364-7-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-8-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-9-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-10-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-11-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-14-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB

    • memory/2364-15-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

      Filesize

      9.6MB