Analysis
-
max time kernel
102s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
09-12-2023 14:13
Static task
static1
Behavioral task
behavioral1
Sample
YoudaoDuiaSrtup.msi
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
YoudaoDuiaSrtup.msi
Resource
win10-20231129-en
Behavioral task
behavioral3
Sample
YoudaoDuiaSrtup.msi
Resource
win10v2004-20231130-en
Behavioral task
behavioral4
Sample
YoudaoDuiaSrtup.msi
Resource
win11-20231129-en
General
-
Target
YoudaoDuiaSrtup.msi
-
Size
102.2MB
-
MD5
6dfa01c13a071656051a59c12bd3a760
-
SHA1
b78d087029e220baa2d2e204515da2eb4c2d9e8b
-
SHA256
7849fe61a8b3e0793c59a3f35d016416be77d65c6ca10e6a5436a972b9fb5156
-
SHA512
8f348de3aacdfcd7aef38d86b9f95fc2b3c7768164d2210137f8eb0f4db6b5bea922ff6afbf786208487362b967744c772dbbef438e2dfd24c1a244070453c82
-
SSDEEP
1572864:WEbB12iidE/5zM2fr5Z1fSAoyeldvp2BB9oH5irfdCT6a:zBed4zM2fr5zqAxqdvkBB9y5ibsea
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
MSI9282.tmpnetfist.exeYloux.exe{CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exepid process 1392 MSI9282.tmp 2376 netfist.exe 1756 Yloux.exe 2356 {CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exe -
Loads dropped DLL 10 IoCs
Processes:
MsiExec.exeMsiExec.execmd.exenetfist.exepid process 2296 MsiExec.exe 2296 MsiExec.exe 2296 MsiExec.exe 2296 MsiExec.exe 2296 MsiExec.exe 2296 MsiExec.exe 1536 MsiExec.exe 1252 cmd.exe 2376 netfist.exe 2376 netfist.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe vmprotect \Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe vmprotect C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe vmprotect behavioral1/memory/2376-61-0x0000000000FC0000-0x0000000001845000-memory.dmp vmprotect behavioral1/memory/2376-63-0x0000000000FC0000-0x0000000001845000-memory.dmp vmprotect behavioral1/memory/2376-100-0x0000000000FC0000-0x0000000001845000-memory.dmp vmprotect behavioral1/memory/2376-255-0x0000000000FC0000-0x0000000001845000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeYloux.exedescription ioc process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: Yloux.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\B: Yloux.exe File opened (read-only) \??\K: Yloux.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: Yloux.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: Yloux.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: Yloux.exe File opened (read-only) \??\H: Yloux.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: Yloux.exe File opened (read-only) \??\R: Yloux.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: Yloux.exe File opened (read-only) \??\J: Yloux.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: Yloux.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: Yloux.exe File opened (read-only) \??\M: Yloux.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: Yloux.exe File opened (read-only) \??\V: Yloux.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: Yloux.exe File opened (read-only) \??\Z: Yloux.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: Yloux.exe File opened (read-only) \??\N: Yloux.exe File opened (read-only) \??\X: Yloux.exe File opened (read-only) \??\Y: Yloux.exe -
Drops file in Windows directory 17 IoCs
Processes:
DrvInst.exemsiexec.exenetfist.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\MSI8EF7.tmp msiexec.exe File created C:\windows\Runn\WindowsTask.exe netfist.exe File created C:\windows\Runn\DuiLib_u.dll netfist.exe File created C:\windows\Runn\1.bin netfist.exe File created C:\Windows\Installer\f768e9a.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\windows\Runn\sqlite3.dll netfist.exe File created C:\windows\Runn\Yloux.exe netfist.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f768e99.msi msiexec.exe File opened for modification C:\Windows\Installer\f768e99.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI908D.tmp msiexec.exe File created C:\Windows\Installer\f768e9c.msi msiexec.exe File opened for modification C:\Windows\Installer\f768e9a.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI9282.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe -
Modifies registry class 24 IoCs
Processes:
msiexec.exe{CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\PackageName = "YoudaoDuiaSrtup.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EF26EB77DBDE6FA48B66C9C7FF686B16 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\ProductName = "youdoaenglshfor39" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4B542F089C6A13946A6711CD3FF120F0\EF26EB77DBDE6FA48B66C9C7FF686B16 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\Language = "2052" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4B542F089C6A13946A6711CD3FF120F0 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\EditFlags = "1702131349" {CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EF26EB77DBDE6FA48B66C9C7FF686B16\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\PackageCode = "AC30FA233F742F545A046D842FB50078" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EF26EB77DBDE6FA48B66C9C7FF686B16\SourceList\Media\DiskPrompt = "[1]" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
msiexec.exenetfist.exeYloux.exepid process 2416 msiexec.exe 2416 msiexec.exe 2376 netfist.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe 1756 Yloux.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2640 msiexec.exe Token: SeIncreaseQuotaPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2416 msiexec.exe Token: SeTakeOwnershipPrivilege 2416 msiexec.exe Token: SeSecurityPrivilege 2416 msiexec.exe Token: SeCreateTokenPrivilege 2640 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2640 msiexec.exe Token: SeLockMemoryPrivilege 2640 msiexec.exe Token: SeIncreaseQuotaPrivilege 2640 msiexec.exe Token: SeMachineAccountPrivilege 2640 msiexec.exe Token: SeTcbPrivilege 2640 msiexec.exe Token: SeSecurityPrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeLoadDriverPrivilege 2640 msiexec.exe Token: SeSystemProfilePrivilege 2640 msiexec.exe Token: SeSystemtimePrivilege 2640 msiexec.exe Token: SeProfSingleProcessPrivilege 2640 msiexec.exe Token: SeIncBasePriorityPrivilege 2640 msiexec.exe Token: SeCreatePagefilePrivilege 2640 msiexec.exe Token: SeCreatePermanentPrivilege 2640 msiexec.exe Token: SeBackupPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeShutdownPrivilege 2640 msiexec.exe Token: SeDebugPrivilege 2640 msiexec.exe Token: SeAuditPrivilege 2640 msiexec.exe Token: SeSystemEnvironmentPrivilege 2640 msiexec.exe Token: SeChangeNotifyPrivilege 2640 msiexec.exe Token: SeRemoteShutdownPrivilege 2640 msiexec.exe Token: SeUndockPrivilege 2640 msiexec.exe Token: SeSyncAgentPrivilege 2640 msiexec.exe Token: SeEnableDelegationPrivilege 2640 msiexec.exe Token: SeManageVolumePrivilege 2640 msiexec.exe Token: SeImpersonatePrivilege 2640 msiexec.exe Token: SeCreateGlobalPrivilege 2640 msiexec.exe Token: SeCreateTokenPrivilege 2640 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2640 msiexec.exe Token: SeLockMemoryPrivilege 2640 msiexec.exe Token: SeIncreaseQuotaPrivilege 2640 msiexec.exe Token: SeMachineAccountPrivilege 2640 msiexec.exe Token: SeTcbPrivilege 2640 msiexec.exe Token: SeSecurityPrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeLoadDriverPrivilege 2640 msiexec.exe Token: SeSystemProfilePrivilege 2640 msiexec.exe Token: SeSystemtimePrivilege 2640 msiexec.exe Token: SeProfSingleProcessPrivilege 2640 msiexec.exe Token: SeIncBasePriorityPrivilege 2640 msiexec.exe Token: SeCreatePagefilePrivilege 2640 msiexec.exe Token: SeCreatePermanentPrivilege 2640 msiexec.exe Token: SeBackupPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeShutdownPrivilege 2640 msiexec.exe Token: SeDebugPrivilege 2640 msiexec.exe Token: SeAuditPrivilege 2640 msiexec.exe Token: SeSystemEnvironmentPrivilege 2640 msiexec.exe Token: SeChangeNotifyPrivilege 2640 msiexec.exe Token: SeRemoteShutdownPrivilege 2640 msiexec.exe Token: SeUndockPrivilege 2640 msiexec.exe Token: SeSyncAgentPrivilege 2640 msiexec.exe Token: SeEnableDelegationPrivilege 2640 msiexec.exe Token: SeManageVolumePrivilege 2640 msiexec.exe Token: SeImpersonatePrivilege 2640 msiexec.exe Token: SeCreateGlobalPrivilege 2640 msiexec.exe Token: SeCreateTokenPrivilege 2640 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 2640 msiexec.exe 2640 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Yloux.exepid process 1756 Yloux.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
msiexec.exeMSI9282.tmpcmd.exenetfist.exedescription pid process target process PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 2296 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1536 2416 msiexec.exe MsiExec.exe PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 2416 wrote to memory of 1392 2416 msiexec.exe MSI9282.tmp PID 1392 wrote to memory of 1252 1392 MSI9282.tmp cmd.exe PID 1392 wrote to memory of 1252 1392 MSI9282.tmp cmd.exe PID 1392 wrote to memory of 1252 1392 MSI9282.tmp cmd.exe PID 1392 wrote to memory of 1252 1392 MSI9282.tmp cmd.exe PID 1252 wrote to memory of 2376 1252 cmd.exe netfist.exe PID 1252 wrote to memory of 2376 1252 cmd.exe netfist.exe PID 1252 wrote to memory of 2376 1252 cmd.exe netfist.exe PID 1252 wrote to memory of 2376 1252 cmd.exe netfist.exe PID 2376 wrote to memory of 1756 2376 netfist.exe Yloux.exe PID 2376 wrote to memory of 1756 2376 netfist.exe Yloux.exe PID 2376 wrote to memory of 1756 2376 netfist.exe Yloux.exe PID 2376 wrote to memory of 1756 2376 netfist.exe Yloux.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\YoudaoDuiaSrtup.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2640
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 159F818CC927F4313363FCDDD0342EB7 C2⤵
- Loads dropped DLL
PID:2296 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 71A82DDCA896243C8E39D05799C012A72⤵
- Loads dropped DLL
PID:1536 -
C:\Windows\Installer\MSI9282.tmp"C:\Windows\Installer\MSI9282.tmp" /EnforcedRunAsAdmin /RunAsAdmin "C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\2.bat"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\2.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exeC:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\windows\Runn\Yloux.exe"C:\windows\Runn\Yloux.exe"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1848
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005BC" "00000000000005AC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\{CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exe"C:\Users\Admin\AppData\Local\Temp\{CABB159E-C2A1-474a-B8B6-71EDEAC4685E}.exe" /s "C:\Users\Admin\AppData\Local\Temp\\{324AD122-9DAF-42e3-AF93-71CE689AA1CF}"1⤵
- Executes dropped EXE
- Modifies registry class
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD506446ef8e645b5a2426fc92a3014f81a
SHA197a3e75c3d9a6804218cac941d13833e7dc74096
SHA2569120e3d45ef5559aea80ac0072363d52bfab7d0c2901bdd65568b423c54c3611
SHA512a6761f9e682d72f5c290cf0467d7b24566e3a79916e08d8ba41384ca57f6b1d161f5d008887a3a4dc17baf8cac5834b21ea942e34600699567d6b183e5bda05d
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
210B
MD5caf534d9f591c8891f1bb48602ae8c37
SHA14ebe49cbed39a223bf1889346d0f47b692271026
SHA256049b668b964c0ff5882816a6cdd09d4119ee3c7a93ebd493df172d79d32d524d
SHA5123e3c2e84e96890feb696b33e7db4df841bf02501bcc52260904f42236194f0dffc6c86aa73aa8f9ee6bab817c85874ce991d5434c181c3ff2320183b249afea0
-
Filesize
387B
MD58d66babbc1659fe9602aa55a66573f80
SHA169190c99744def73fde9aea61caf34472ce70268
SHA2567091591d7e9f17d9519a224da331fcdc19cb5c91ea3eb5d4bc31dbca1fbb6125
SHA512b1c96131b54894ea3a533698299906e5e67bb0471a3cf11e86efb88d3e40da0dfc11d282a85a06aa6ca72ba5e9b0fbf2e019762d13afa43a50a59d7872cc04f1
-
Filesize
1KB
MD5aee3a9aa9562489d93cd74d3bad9dd41
SHA1469f108c2eaaadf601e16c12a71783f506fe570f
SHA25635403d68c69e9e2bf73076c3426cda8a74771679a56ffd973049383a7326cb72
SHA5128585f52bb88e1d5e758031fead32cc7f069524018b0ac879614be401e19fbd9b8f0cc42edd1ad33520070c7dafdb377d2127f036aa57280d5253385192d57ee0
-
Filesize
1KB
MD59500f1e17d2418b17f84ea27ac40624e
SHA18662a8cf51dcbce2cb58dcc4be0708d1c6c72eff
SHA2568151e66624000a8b540073e172f51778d7d1717752a8a5820cc775160c97704e
SHA512a325b24927ab228e324c19b04d9b0df517487ac64ee814cc1a5d634a035924f2ec0c4753c3de7e1c318d6add42d357f87f54254db402e7f106c5873bb9449505
-
Filesize
215B
MD5dd880555b2acd9085aa1513af5eeec8e
SHA1ad09c99fe64dad5859de09c4a293857629c91b8c
SHA25693a89b8467ccfff06abca2f2a57b3a70ac8a6e7446ab8c9f43e8a882e95c5015
SHA512f561aab3c2f3757260e77f5d4c75111648a0c7adcf754c3bc2daec329887fbc3b4708b264827c84d5b33520c5062f16f796f95e07b51754519ea327d256623ba
-
Filesize
1.0MB
MD5217dc98e219a340cb09915244c992a52
SHA1a04f101ca7180955d62e4a1aaeccdcca489209da
SHA25627c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c
SHA512dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85
-
Filesize
41B
MD512c6e814a8844f939daa8ec4d4a6a3c7
SHA1abfd9552064ad03839a9395ead502262d9cb8d01
SHA256c886afbc6940d821cbc534c0d56f3c759efc455af15662ff27c24952ed766306
SHA512e7bcc3c07dfe7f00084be67e135c62337375f10c7f31cd4f07de8170f70ea4e6310adc38e342b1a3d2b192470ff6cfc6962e020c33bf1372ac1b0bc818f6d031
-
Filesize
5.4MB
MD57f1a45d1319d27be5e9caca49a70a231
SHA19997ae59f4690081727b00888c839bf3347590b9
SHA256c40586e069e2516850436961f3848b7c03d27e8c150c362af3f8c1961ff70101
SHA512fb674be9647eb485fac2f6795f606844815f86980ba3c1b2e22a4d832e8c1993156c55cf0739663327f967aaa98a76a1e8e85f151f724fa6255d1f16d33beddc
-
Filesize
5.4MB
MD57f1a45d1319d27be5e9caca49a70a231
SHA19997ae59f4690081727b00888c839bf3347590b9
SHA256c40586e069e2516850436961f3848b7c03d27e8c150c362af3f8c1961ff70101
SHA512fb674be9647eb485fac2f6795f606844815f86980ba3c1b2e22a4d832e8c1993156c55cf0739663327f967aaa98a76a1e8e85f151f724fa6255d1f16d33beddc
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
409KB
MD5f7e1ad874fba884ceabfdb0f8edf74bb
SHA1dcd89a248a6e3d85bb3f7eae624a41cef9704654
SHA256bbce37f9e20f5bc59ab45dc49c985d115b13bb214561ddb874118fd91fb52ce8
SHA5125e59de04305aff37703e928a594b9114fb728e3285c09aae7706339d9f9ee77652271de5899738e8410d13224838efb3e30f5ab4e149c21458d3c971010dd209
-
Filesize
409KB
MD5f7e1ad874fba884ceabfdb0f8edf74bb
SHA1dcd89a248a6e3d85bb3f7eae624a41cef9704654
SHA256bbce37f9e20f5bc59ab45dc49c985d115b13bb214561ddb874118fd91fb52ce8
SHA5125e59de04305aff37703e928a594b9114fb728e3285c09aae7706339d9f9ee77652271de5899738e8410d13224838efb3e30f5ab4e149c21458d3c971010dd209
-
Filesize
102.2MB
MD56dfa01c13a071656051a59c12bd3a760
SHA1b78d087029e220baa2d2e204515da2eb4c2d9e8b
SHA2567849fe61a8b3e0793c59a3f35d016416be77d65c6ca10e6a5436a972b9fb5156
SHA5128f348de3aacdfcd7aef38d86b9f95fc2b3c7768164d2210137f8eb0f4db6b5bea922ff6afbf786208487362b967744c772dbbef438e2dfd24c1a244070453c82
-
Filesize
3.0MB
MD50f0880c90d955267cd848fe6e8498d4f
SHA164c0ed793909f2b29374ddb00f05222e9578bb6f
SHA256701e76db5b7d4c8a5f5339cce7d7521096854acdb2b3f6541f63f759b17c5636
SHA512fb42bcf1acad5a60c4cefa3d5d84e2a8ccdfc05b950279a0358022844857e789d00c35c46c32c24888ca263aff916dc4550f29a3950f19353584c37e74253462
-
Filesize
378KB
MD53d4a9ff9ca614bc1a25b1ffec75cc10f
SHA1d5b451d8ed1730da915419fb195278f973f1b7ce
SHA256518df94659ce71ce2e23ea66bc681bd9e9bbb88a64db534e95baa24a3dcaff9d
SHA5128adc9c383bea9f8f9a72c44973edcdaeb1ad988657ae18b0f782ec83a6943b1b31557848d61e5bd48dcf0250d7b6488ee5f17be9d072ce77fdb4e5ce32ee0f7b
-
Filesize
3.0MB
MD50f0880c90d955267cd848fe6e8498d4f
SHA164c0ed793909f2b29374ddb00f05222e9578bb6f
SHA256701e76db5b7d4c8a5f5339cce7d7521096854acdb2b3f6541f63f759b17c5636
SHA512fb42bcf1acad5a60c4cefa3d5d84e2a8ccdfc05b950279a0358022844857e789d00c35c46c32c24888ca263aff916dc4550f29a3950f19353584c37e74253462
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
1.0MB
MD5217dc98e219a340cb09915244c992a52
SHA1a04f101ca7180955d62e4a1aaeccdcca489209da
SHA25627c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c
SHA512dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85
-
Filesize
5.4MB
MD57f1a45d1319d27be5e9caca49a70a231
SHA19997ae59f4690081727b00888c839bf3347590b9
SHA256c40586e069e2516850436961f3848b7c03d27e8c150c362af3f8c1961ff70101
SHA512fb674be9647eb485fac2f6795f606844815f86980ba3c1b2e22a4d832e8c1993156c55cf0739663327f967aaa98a76a1e8e85f151f724fa6255d1f16d33beddc
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
3.0MB
MD50f0880c90d955267cd848fe6e8498d4f
SHA164c0ed793909f2b29374ddb00f05222e9578bb6f
SHA256701e76db5b7d4c8a5f5339cce7d7521096854acdb2b3f6541f63f759b17c5636
SHA512fb42bcf1acad5a60c4cefa3d5d84e2a8ccdfc05b950279a0358022844857e789d00c35c46c32c24888ca263aff916dc4550f29a3950f19353584c37e74253462