Overview
overview
7Static
static
343d963bb3d...18.exe
windows7-x64
743d963bb3d...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
1Acrobat2Dict.dll
windows10-2004-x64
1RunDict.exe
windows7-x64
4RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
1TextExtrac...32.dll
windows10-2004-x64
1TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
1WordBook.exe
windows10-2004-x64
1WordStroke...32.dll
windows7-x64
1WordStroke...32.dll
windows10-2004-x64
1WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1YodaoDict.dll
windows7-x64
3YodaoDict.dll
windows10-2004-x64
3YodaoDict.exe
windows7-x64
4YodaoDict.exe
windows10-2004-x64
4YodaoOcr.exe
windows7-x64
1YodaoOcr.exe
windows10-2004-x64
1YoudaoEH.exe
windows7-x64
1YoudaoEH.exe
windows10-2004-x64
1YoudaoGetWord32.dll
windows7-x64
1YoudaoGetWord32.dll
windows10-2004-x64
1YoudaoGetWord64.dll
windows7-x64
7YoudaoGetWord64.dll
windows10-2004-x64
7Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RunDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TextExtractorImpl32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
TextExtractorImpl64.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
WordBook.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
WordStrokeHelper32.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
WordStrokeHelper64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
YodaoDict.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
YodaoDict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
YodaoDict.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
YodaoDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
YodaoOcr.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
YodaoOcr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
YoudaoEH.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
YoudaoEH.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
YoudaoGetWord32.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
YoudaoGetWord32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
YoudaoGetWord64.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
YoudaoGetWord64.dll
Resource
win10v2004-20240709-en
General
-
Target
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
-
Size
4.7MB
-
MD5
43d963bb3d6d59917024fbcd50eebaac
-
SHA1
848a6799540049d5054bd4a9d43521cdcfbf2ea8
-
SHA256
d2cd99f2ffcad6cc11d3798ad269c5a711ac9a9bd445e940df99b65d8b095d4b
-
SHA512
efef3abf5c0106b2278fe8701e77a5fdf5aa02da979f70379240d07df3763de84244a1376c958c0773404201b122952dfc9a8b8cf97898c35ee88c6c3dc946c0
-
SSDEEP
98304:i/W8zYD3JB9+RdcrhzBNmG5DFzD2DhLJFg4mYfU93YjIPR4t263ez3xQiqAQ7BS:i//E3JBsRdmzBAu+gE+RJ2xvFI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation YodaoDict.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 2 IoCs
pid Process 4644 YodaoDict.exe 4396 YodaoDict.exe -
Loads dropped DLL 3 IoCs
pid Process 2832 regsvr32.exe 3652 regsvr32.exe 5064 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YodaoDict = "\"C:\\Program Files (x86)\\Youdao\\Dict\\RunDict.exe\" -hide" YodaoDict.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Youdao\Dict\tessdll.dll 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\YodaoDict.api YodaoDict.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\skins\world-cup.css 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\images\nosound.GIF 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\skins\world-cup.png 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\res\updater.xsl 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdata\eng.user-words 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\guid.dat YodaoDict.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\YodaoOcr.exe 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\verifycode.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\images\cidian_aqurebutton_close.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\TextExtractorImpl32.dll 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\dicten.db 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\intro\images\arrow.png 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\js\ui.js 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\skins\win7-default.bmp 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\result.xsl 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\result.xsl 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\smartresult.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\skins\xp-cute.css 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\skins\xp-cute.xml 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdata\eng.normproto 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\tessdata\eng.user-words 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\verifycode.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\css\default.css 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\images\graypointpoint.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\res\images\image-q3-21.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\intro\step2.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\WordBook.exe 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\images\outlink.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\skins\world-cup.bmp 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdata\eng.freq-dawg 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdll.dll 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\images\baike.jpg 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\skins\default.png 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\default_config.ini 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\js\jquery.min.js 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\intro\images 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\TextExtractorImpl32.dll 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\wiki.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\images\cidian_point_empty.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\intro\images\topbar_step_arrow.png 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\res\images\image-q1-2.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdata\eng.unicharset 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\wiki.html 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\images\nosound.GIF 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\intro\style.css 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\uninst.exe 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\images\graypoint.gif 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\resultui\js\jquery.min.js 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\intro\images\topbar_step_bg.png 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui\instantresult.xsl 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\skins\xp-blue.css 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\tessdata\eng.DangAmbigs 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\tessdata\eng.DangAmbigs 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\default_config.ini 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\dictcn.db 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\versions.xml 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\intro\images\sprite.jpg 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\YodaoDict.api 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\WordBook.exe 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\versions.xml 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File created C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Youdao\Dict\resultui 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ProgID\ = "YoudaoGetWord32.Connect.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CurVer\ = "YoudaoGetWord32.Connect.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\VersionIndependentProgID\ = "YoudaoGetWord64.Connect" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0\win32\ = "C:\\Program Files (x86)\\Youdao\\Dict\\YoudaoGetWord32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\CLSID\ = "{07473267-2FBF-468D-8C7D-A9DB6211F5F2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Youdao\\Dict\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0\win64\ = "C:\\Program Files (x86)\\Youdao\\Dict\\YoudaoGetWord64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CurVer\ = "YoudaoGetWord64.Connect.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32\ = "C:\\Program Files (x86)\\Youdao\\Dict\\YoudaoGetWord32.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\ = "YoudaoGetWord 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\CLSID\ = "{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CLSID\ = "{07473267-2FBF-468D-8C7D-A9DB6211F5F2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CLSID\ = "{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ProgID\ = "YoudaoGetWord64.Connect.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\TypeLib\ = "{55684B24-475C-4969-8C82-B498B5A53596}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\VersionIndependentProgID\ = "YoudaoGetWord32.Connect" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\ = "YoudaoGetWord 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\TypeLib\ = "{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32\ = "C:\\Program Files (x86)\\Youdao\\Dict\\YoudaoGetWord64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Youdao\\Dict\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\VersionIndependentProgID regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4644 YodaoDict.exe 4396 YodaoDict.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4644 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 87 PID 3040 wrote to memory of 4644 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 87 PID 3040 wrote to memory of 4644 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 87 PID 4644 wrote to memory of 3120 4644 YodaoDict.exe 88 PID 4644 wrote to memory of 3120 4644 YodaoDict.exe 88 PID 4644 wrote to memory of 2832 4644 YodaoDict.exe 90 PID 4644 wrote to memory of 2832 4644 YodaoDict.exe 90 PID 4644 wrote to memory of 2832 4644 YodaoDict.exe 90 PID 4644 wrote to memory of 3652 4644 YodaoDict.exe 91 PID 4644 wrote to memory of 3652 4644 YodaoDict.exe 91 PID 4644 wrote to memory of 3652 4644 YodaoDict.exe 91 PID 3652 wrote to memory of 5064 3652 regsvr32.exe 92 PID 3652 wrote to memory of 5064 3652 regsvr32.exe 92 PID 3040 wrote to memory of 4396 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 93 PID 3040 wrote to memory of 4396 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 93 PID 3040 wrote to memory of 4396 3040 43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe 93 PID 4396 wrote to memory of 5008 4396 YodaoDict.exe 94 PID 4396 wrote to memory of 5008 4396 YodaoDict.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe"C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe" install2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {5a82a30e-5da6-492d-8bb8-58d77df8d829} -a "YoudaoDictionary" -v "NetEase" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe"3⤵PID:3120
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Program Files (x86)\Youdao\Dict\YoudaoGetWord32.dll" /s3⤵
- Loads dropped DLL
- Modifies registry class
PID:2832
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Program Files (x86)\Youdao\Dict\YoudaoGetWord64.dll" /s3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\system32\regsvr32.exe"C:\Program Files (x86)\Youdao\Dict\YoudaoGetWord64.dll" /s4⤵
- Loads dropped DLL
- Modifies registry class
PID:5064
-
-
-
-
C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe"C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe" instreport2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {5a82a30e-5da6-492d-8bb8-58d77df8d829} -a "YoudaoDictionary" -v "NetEase" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Program Files (x86)\Youdao\Dict\YodaoDict.exe"3⤵PID:5008
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5ad2960fde1e77cb9f59ba8ebde31b73a
SHA193bffbd719f2017beece3dcabe2e5a5b093d7844
SHA256791597b08e6d3f2358ce6ceaab6abc94c030da7ee9b22baf594c58f8d1f6b040
SHA51200369da06d7e22104821cce62e1398a1625acb8f0d21b28d9b507ba092c8069314a810558c67d9762f0708fae77673e253153c92569acef7a1c30f00a6e7a7ac
-
Filesize
176KB
MD5f644fd525eb7a16842963458f95a8f24
SHA19fd9bad66fd39348dbb1faa58b8e3841663acdb4
SHA256378c1de993cbb32e9cf8663b1c20986733da5e8755649eac1dee2938332fc319
SHA5120436cd4a2302953900e2a5799f1585682f22f39cce54bc0e9ff9a48338056ba3853af04bdc6ae8c4304305ff70d4a094723188da197cca25b66ef9404fe3c0a9
-
Filesize
1.6MB
MD5c7ed7d11c78afcff633ad5109445820f
SHA1fac007401a37d621f32c4ee7e426c153dc12203e
SHA25699c01ecce6c52ab30736b74c4fd519298b133125b7c2b2c0926763d0f471818a
SHA512e4ff7760844dbb0c284c7d200eaf95520c7291e6a932289d5b098521e4b759ae4d44390c0dd59b039a8111e892a11872f70f6839126fd3d93e7c4790130d9061
-
Filesize
301KB
MD5defdfacb94569297bd74cdce30d014f1
SHA129424c26e644dd97b345d7c91b025a65d93d6605
SHA2567a0fc662db1894071eb3a2b83e0d8c9f00b7ef2604b7aa903ba44f51ced452b1
SHA512d4e4e37763628bd7757cfa23a88b1cb5cac77c2d89eb8a3030de535203a2e6a3da1b2a1fd4cf7bd183f48cdaa24ad19f1c754da11d83be966f94c3eae73ca6fe
-
Filesize
481KB
MD57e12d51099017eafdf2b7626c514dce4
SHA1f84a8c654e2ec5e080cea767a44a2d2a803c1e66
SHA2560114d12aae2ebbfabda09a8e02a1bcffb91e4dce863c1c86b4668436aee50f57
SHA512c85df7920f76a750af966067a16cafd5acd4fdf2f2514824ad4fa8d7d1bfc487eece0d735c2bb4da685a26d12b383f9f4598e72c17e7dad9a316fccbc1ddedd8
-
Filesize
77B
MD54d0f73ef439be3e82ed8f0b1ec9f34fc
SHA17e41c414369b51e8d846d0c6e701c4f393a18a78
SHA2560408a6c40b7e3793a49510bad89c1ca52d906aafad5f27064223ebec4a4f5f5b
SHA5123103b11966f389a6d5537be4ae7d37be9a131b27b0958f76948b09b0bf972db6dbdfa91ccd7e5c9ef3fcbacda41e0f42e4b1c04557e2f33cd08274fd324f5e93
-
Filesize
16B
MD5b0eddf51a1e044440de1b4a2071d9510
SHA1e8e94af15f67cfde0307e37589b1ca5ae29616f9
SHA2568a3917ee025d6901770b7eabe6042b534ab3b037539015868e5a61693e46fa09
SHA5129d9b6ff90e45bc361b8fa28268dbb0e4588973f8a5c00fc25b697179b6750f2d227c3a001b2a75b6c0f7fe8961bb1964b7789c280e42c9c140404f3122f6a703
-
Filesize
549KB
MD52055451ef343ddf16e3381af30ce836d
SHA1c0ff6dd53d6664e05407b72bf725f7837c7e8394
SHA25642b9c7089e17be21d5c8441ec8600b2d93627be08f6fe19081c08af7bbc8ba69
SHA512da250349668c97305612d7658bc86f7d726507f287396813f452cc127e8fe7017524d4dc518e87d630adf44d3f60509d154b6585b763c3eae914b70cd4a682bc
-
Filesize
4B
MD5e11ce15ad01f5fef87016b607ea74a1b
SHA1e212d05d3aebab836c32bc247a0f325e96dc17d9
SHA256146d7002ea6e76a5f6296cb7f8c1152e33e2f29903711fd7c997768a1ba2628b
SHA5129c4c0c7ef9e62bf4656edd61f69dd4aa317365ee692191030cab99ea396f37a964f38990adda328710f8b245ce1f9bef2e1abfc170782a0c2b06e5c7320e9023
-
Filesize
152B
MD5507aa37f0e73cff1815e04c31ea15da9
SHA12f46e5264ed3aa291a8d5c70742aaa2ad1977ecd
SHA2566b8dded65908751e021f7ab374af3626ef577ea0ca3018f89c207e1915d98bb4
SHA51235f622a255d2fa8e0f514baf87e505cc576047fe5178ab98e81c41e0c0af0cdbd7d1f2c60b8f0a2398747b36034e5233f92beecbf294037eac20ba7da4e38ed5
-
Filesize
828B
MD50e1fe243c0d3726868770e998415118b
SHA1058df77e26b67704d67834c78f0f82a80fb053dc
SHA25602eeef10b4523bef247ac07e0d4a2a0470a9c2e307225532bdff17d987111c3e
SHA512558ce7ab6acfe49032206b00684d015e399805ff2b8efcdd84aa7e3bcd2a69ad01a8b703d5d8ca290831dd0fbb628abc190d1aaddcf2723f7342741e868b144d
-
Filesize
954B
MD526093b98a4cf7eba54956b6ff78b1e7d
SHA103158c1fab1fc09b12a3af6a2d81eeb50c6531dc
SHA256da55620095fbef0f2726a844dbb3f8759240926d939ee57d897f83783b9b6149
SHA51265271f5a264eea5ac3035c6aa2f9d6ba5a7a6b8947ae57f268c0abf8d1a73e498a9179e41aad6e223c619e52883872fc0f45bfd65241897449d7cd4b8fb83148
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1403246978-718555486-3105247137-1000\0f5007522459c86e95ffcc62f32308f1_58831928-6f9f-451d-8f26-c40399c5c878
Filesize1KB
MD57893fe347bd3da8f42cc28b171533127
SHA1f381d73e29ede7b5a5ede3463971089ef2866e8e
SHA256f1d24a1167bce555b2593a00c7186f567f4194dd81522ddd4dd5451ae55be907
SHA51214a24d480ffcfed9321f4f1d6d0cc0fa55d95207ca6c1636cb02ad2cb587e5467fc54329f886421da4165934ee68b92793eaf3f361e9e75f9d0a06b27037c896