Analysis

  • max time kernel
    73s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2022, 17:32

General

  • Target

    https://github.com/experfreesoft/voolk/releases/download/vds/RegSvc.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/experfreesoft/voolk/releases/download/vds/RegSvc.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1508
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V6CJ2G8R\RegSvc.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V6CJ2G8R\RegSvc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d51ed78fd5608cfa9dbd5c3cd72feee

    SHA1

    b9d3130ec210e365e2deef3fd8fb9a0f79848391

    SHA256

    c67c8e2929c53b079788ea316a525d360e4cc64a237459897993aeeaff62c027

    SHA512

    0ee7b66ca5adac2fb952e9059a2b8d70ab7c3648da3643b77d2f681cc18353ae81ddd5089a61d104a1b9718a4d0331e0c4e783736cd990a99b5e23c899c981e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V6CJ2G8R\RegSvc.exe

    Filesize

    13KB

    MD5

    686847d049b8af50838377d44c76897c

    SHA1

    594db28cdebbe70e8224d1a9ccd147434f1f482e

    SHA256

    1e015917df61fe296c400ed4d7a18facdc0793a03fe2afeeadf784be6416fdf9

    SHA512

    73e461b4857c4fea9a24ace0f05c7f429116c7329a7ec241eed567d1c33638d9b0b65f4cd4cb1e5044e0d1acadf4c454fe10f9514a2644a977db4fe7681bbd6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V6CJ2G8R\RegSvc.exe.n06m7wk.partial

    Filesize

    13KB

    MD5

    686847d049b8af50838377d44c76897c

    SHA1

    594db28cdebbe70e8224d1a9ccd147434f1f482e

    SHA256

    1e015917df61fe296c400ed4d7a18facdc0793a03fe2afeeadf784be6416fdf9

    SHA512

    73e461b4857c4fea9a24ace0f05c7f429116c7329a7ec241eed567d1c33638d9b0b65f4cd4cb1e5044e0d1acadf4c454fe10f9514a2644a977db4fe7681bbd6c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GQV3JWA1.txt

    Filesize

    608B

    MD5

    50d83f707c13ba2967df08369ce8da3a

    SHA1

    8c6783552a7af33b31b61f42a7303b900099e6a1

    SHA256

    5e50839ad84f23ef9b9b7f3a388999ed2711cceaad4f9ade0a24b612915bddb8

    SHA512

    f76c1dd66d50bbd9d6a6eff1e72b39c725aeb8495e0fdd908e1d88838f561f1802b239e9250b585aa44d6999f1404eb9df3a963ca6be7e99824b9c2ea70613df

  • memory/1800-57-0x0000000000E90000-0x0000000000E9A000-memory.dmp

    Filesize

    40KB