Overview
overview
7Static
static
343d963bb3d...18.exe
windows7-x64
743d963bb3d...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
1Acrobat2Dict.dll
windows10-2004-x64
1RunDict.exe
windows7-x64
4RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
1TextExtrac...32.dll
windows10-2004-x64
1TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
1WordBook.exe
windows10-2004-x64
1WordStroke...32.dll
windows7-x64
1WordStroke...32.dll
windows10-2004-x64
1WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1YodaoDict.dll
windows7-x64
3YodaoDict.dll
windows10-2004-x64
3YodaoDict.exe
windows7-x64
4YodaoDict.exe
windows10-2004-x64
4YodaoOcr.exe
windows7-x64
1YodaoOcr.exe
windows10-2004-x64
1YoudaoEH.exe
windows7-x64
1YoudaoEH.exe
windows10-2004-x64
1YoudaoGetWord32.dll
windows7-x64
1YoudaoGetWord32.dll
windows10-2004-x64
1YoudaoGetWord64.dll
windows7-x64
7YoudaoGetWord64.dll
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RunDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TextExtractorImpl32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
TextExtractorImpl64.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
WordBook.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
WordStrokeHelper32.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
WordStrokeHelper64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
YodaoDict.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
YodaoDict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
YodaoDict.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
YodaoDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
YodaoOcr.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
YodaoOcr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
YoudaoEH.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
YoudaoEH.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
YoudaoGetWord32.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
YoudaoGetWord32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
YoudaoGetWord64.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
YoudaoGetWord64.dll
Resource
win10v2004-20240709-en
General
-
Target
YodaoDict.exe
-
Size
1.6MB
-
MD5
c7ed7d11c78afcff633ad5109445820f
-
SHA1
fac007401a37d621f32c4ee7e426c153dc12203e
-
SHA256
99c01ecce6c52ab30736b74c4fd519298b133125b7c2b2c0926763d0f471818a
-
SHA512
e4ff7760844dbb0c284c7d200eaf95520c7291e6a932289d5b098521e4b759ae4d44390c0dd59b039a8111e892a11872f70f6839126fd3d93e7c4790130d9061
-
SSDEEP
49152:U630lcQUu3NRT7onBeBXAzYLMRA6jmHrkoJh+5daJXlID:P1QUudIBeBXAzYLMRA6jmHrkoJh+5da0
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\YodaoDict.api YodaoDict.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\YodaoDict.api YodaoDict.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Internet Explorer\IESettingSync YodaoDict.exe Set value (int) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" YodaoDict.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch YodaoDict.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" YodaoDict.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 424 YodaoDict.exe Token: SeIncBasePriorityPrivilege 424 YodaoDict.exe Token: 33 424 YodaoDict.exe Token: SeIncBasePriorityPrivilege 424 YodaoDict.exe Token: 33 424 YodaoDict.exe Token: SeIncBasePriorityPrivilege 424 YodaoDict.exe Token: 33 424 YodaoDict.exe Token: SeIncBasePriorityPrivilege 424 YodaoDict.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 3656 YoudaoEH.exe 3656 YoudaoEH.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe 424 YodaoDict.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 424 wrote to memory of 1688 424 YodaoDict.exe 86 PID 424 wrote to memory of 1688 424 YodaoDict.exe 86 PID 424 wrote to memory of 3656 424 YodaoDict.exe 88 PID 424 wrote to memory of 3656 424 YodaoDict.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {5a82a30e-5da6-492d-8bb8-58d77df8d829} -a "YoudaoDictionary" -v "NetEase" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"2⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57b51ce7a7e72ceb992f9066158e0d7fb
SHA1f1a4f8d7e315f38155c9700156a86a238239702c
SHA256464a31f7fc09e7c700d8ba701f7fd85fd9e308e8d344e90ba22d5053ca4fa82b
SHA512c895b73dc37276b12b1ee7bee8c107bc4784a8d569cba5d340c45d17fc2291dc88fda3398545b0d6a3c4bc23ed052d5741152ec9cc9c798b85efe5ec6ed00e9b
-
Filesize
4KB
MD577fc5119820bb7fdab9e196bf9c68a61
SHA1e83de81269c6cc321e3123e60e7d339d3a5b6cfe
SHA2561748c8531cd0da6bda10f4177d17dc283a6716458535ba9a335b6d3bb2846428
SHA51225209a3d3fc2ecdbf78d85149c4394ee25005a895b12b4ef832f9587722ef17dd78b8f6ebeeb9813a817806e6e27fd3f20f96c7c6f7364ead4c9ea6dfba63bf1