Overview
overview
7Static
static
343d963bb3d...18.exe
windows7-x64
743d963bb3d...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
1Acrobat2Dict.dll
windows10-2004-x64
1RunDict.exe
windows7-x64
4RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
1TextExtrac...32.dll
windows10-2004-x64
1TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
1WordBook.exe
windows10-2004-x64
1WordStroke...32.dll
windows7-x64
1WordStroke...32.dll
windows10-2004-x64
1WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1YodaoDict.dll
windows7-x64
3YodaoDict.dll
windows10-2004-x64
3YodaoDict.exe
windows7-x64
4YodaoDict.exe
windows10-2004-x64
4YodaoOcr.exe
windows7-x64
1YodaoOcr.exe
windows10-2004-x64
1YoudaoEH.exe
windows7-x64
1YoudaoEH.exe
windows10-2004-x64
1YoudaoGetWord32.dll
windows7-x64
1YoudaoGetWord32.dll
windows10-2004-x64
1YoudaoGetWord64.dll
windows7-x64
7YoudaoGetWord64.dll
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RunDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TextExtractorImpl32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
TextExtractorImpl64.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
WordBook.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
WordStrokeHelper32.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
WordStrokeHelper64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
YodaoDict.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
YodaoDict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
YodaoDict.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
YodaoDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
YodaoOcr.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
YodaoOcr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
YoudaoEH.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
YoudaoEH.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
YoudaoGetWord32.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
YoudaoGetWord32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
YoudaoGetWord64.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
YoudaoGetWord64.dll
Resource
win10v2004-20240709-en
General
-
Target
YodaoDict.exe
-
Size
1.6MB
-
MD5
c7ed7d11c78afcff633ad5109445820f
-
SHA1
fac007401a37d621f32c4ee7e426c153dc12203e
-
SHA256
99c01ecce6c52ab30736b74c4fd519298b133125b7c2b2c0926763d0f471818a
-
SHA512
e4ff7760844dbb0c284c7d200eaf95520c7291e6a932289d5b098521e4b759ae4d44390c0dd59b039a8111e892a11872f70f6839126fd3d93e7c4790130d9061
-
SSDEEP
49152:U630lcQUu3NRT7onBeBXAzYLMRA6jmHrkoJh+5daJXlID:P1QUudIBeBXAzYLMRA6jmHrkoJh+5da0
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch YodaoDict.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" YodaoDict.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main YodaoDict.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 YodaoDict.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 2508 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2508 YodaoDict.exe Token: 33 2508 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2508 YodaoDict.exe Token: 33 2508 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2508 YodaoDict.exe Token: 33 2508 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2508 YodaoDict.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2772 YoudaoEH.exe 2772 YoudaoEH.exe 2508 YodaoDict.exe 2508 YodaoDict.exe 2508 YodaoDict.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2772 2508 YodaoDict.exe 29 PID 2508 wrote to memory of 2772 2508 YodaoDict.exe 29 PID 2508 wrote to memory of 2772 2508 YodaoDict.exe 29 PID 2508 wrote to memory of 2772 2508 YodaoDict.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57b51ce7a7e72ceb992f9066158e0d7fb
SHA1f1a4f8d7e315f38155c9700156a86a238239702c
SHA256464a31f7fc09e7c700d8ba701f7fd85fd9e308e8d344e90ba22d5053ca4fa82b
SHA512c895b73dc37276b12b1ee7bee8c107bc4784a8d569cba5d340c45d17fc2291dc88fda3398545b0d6a3c4bc23ed052d5741152ec9cc9c798b85efe5ec6ed00e9b
-
Filesize
4KB
MD577fc5119820bb7fdab9e196bf9c68a61
SHA1e83de81269c6cc321e3123e60e7d339d3a5b6cfe
SHA2561748c8531cd0da6bda10f4177d17dc283a6716458535ba9a335b6d3bb2846428
SHA51225209a3d3fc2ecdbf78d85149c4394ee25005a895b12b4ef832f9587722ef17dd78b8f6ebeeb9813a817806e6e27fd3f20f96c7c6f7364ead4c9ea6dfba63bf1
-
Filesize
95KB
MD5783aecd15c6add959e5357c6178514ff
SHA146c48ad8c936cf79fabd3d37cc7850f64d6cea38
SHA256f6fc2e316358f54fec4eb6b52c445792efd2604d68934ef0895499f233325d07
SHA5123cd650dc3a1765911d7c1f6d28965565d6389fac229109938b6a1e103f31ca9e57599b7d41c93037ed95a29c551c57c6764a8b020ebc503969536c4f35402e3c
-
Filesize
34B
MD5d74249e681b2f0ccf7c61d0c5430218a
SHA10c4e809998fb149408cb6581967c4d71b8967edd
SHA25660f36aa79f436fd611e16c7cd8ca928e709712fda22fafccfc79fd8d66569569
SHA512b34bb8ec066bf443a6ae937f2c7b8170ad9efe3665f823b5c3aab1c470847a23a5cfb1fd07624230d885cf5c2b256bd9b098d8a887cabe51fd6531df50f34858