Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
343d963bb3d...18.exe
windows7-x64
743d963bb3d...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
1Acrobat2Dict.dll
windows10-2004-x64
1RunDict.exe
windows7-x64
4RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
1TextExtrac...32.dll
windows10-2004-x64
1TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
1WordBook.exe
windows10-2004-x64
1WordStroke...32.dll
windows7-x64
1WordStroke...32.dll
windows10-2004-x64
1WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1YodaoDict.dll
windows7-x64
3YodaoDict.dll
windows10-2004-x64
3YodaoDict.exe
windows7-x64
4YodaoDict.exe
windows10-2004-x64
4YodaoOcr.exe
windows7-x64
1YodaoOcr.exe
windows10-2004-x64
1YoudaoEH.exe
windows7-x64
1YoudaoEH.exe
windows10-2004-x64
1YoudaoGetWord32.dll
windows7-x64
1YoudaoGetWord32.dll
windows10-2004-x64
1YoudaoGetWord64.dll
windows7-x64
7YoudaoGetWord64.dll
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43d963bb3d6d59917024fbcd50eebaac_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RunDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TextExtractorImpl32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
TextExtractorImpl64.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
WordBook.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
WordStrokeHelper32.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
WordStrokeHelper64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
YodaoDict.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
YodaoDict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
YodaoDict.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
YodaoDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
YodaoOcr.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
YodaoOcr.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
YoudaoEH.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
YoudaoEH.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
YoudaoGetWord32.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
YoudaoGetWord32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
YoudaoGetWord64.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
YoudaoGetWord64.dll
Resource
win10v2004-20240709-en
General
-
Target
RunDict.exe
-
Size
361KB
-
MD5
ad2960fde1e77cb9f59ba8ebde31b73a
-
SHA1
93bffbd719f2017beece3dcabe2e5a5b093d7844
-
SHA256
791597b08e6d3f2358ce6ceaab6abc94c030da7ee9b22baf594c58f8d1f6b040
-
SHA512
00369da06d7e22104821cce62e1398a1625acb8f0d21b28d9b507ba092c8069314a810558c67d9762f0708fae77673e253153c92569acef7a1c30f00a6e7a7ac
-
SSDEEP
6144:ueoo4DrmbppQbNWDf79h5L0lvfW1NGu/HhQ1UCDICJlhM8:2Dr2ppQMcvfW3DHhQ1J5hM8
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main YodaoDict.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch YodaoDict.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" YodaoDict.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 2156 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2156 YodaoDict.exe Token: 33 2156 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2156 YodaoDict.exe Token: 33 2156 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2156 YodaoDict.exe Token: 33 2156 YodaoDict.exe Token: SeIncBasePriorityPrivilege 2156 YodaoDict.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2936 YoudaoEH.exe 2936 YoudaoEH.exe 2156 YodaoDict.exe 2156 YodaoDict.exe 2156 YodaoDict.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2156 2432 RunDict.exe 30 PID 2432 wrote to memory of 2156 2432 RunDict.exe 30 PID 2432 wrote to memory of 2156 2432 RunDict.exe 30 PID 2432 wrote to memory of 2156 2432 RunDict.exe 30 PID 2156 wrote to memory of 2936 2156 YodaoDict.exe 31 PID 2156 wrote to memory of 2936 2156 YodaoDict.exe 31 PID 2156 wrote to memory of 2936 2156 YodaoDict.exe 31 PID 2156 wrote to memory of 2936 2156 YodaoDict.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RunDict.exe"C:\Users\Admin\AppData\Local\Temp\RunDict.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe" start2⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51aaac195b685939e22902871f0337d26
SHA107ac75f91dce9f6743644d5f6036170216b9f26e
SHA256a5adf51560694560eebe7348b86505f0685adabbf9bb4ebd92bb03280f993e2e
SHA51231bdcd4b3664a3f177e700333881801e6050a53bce4d97dfd0391bae814e0cbd7869a85b004062bd6c3605c4c00aa676cd54bba705e7620c4cb705ce34e78f29
-
Filesize
95KB
MD5783aecd15c6add959e5357c6178514ff
SHA146c48ad8c936cf79fabd3d37cc7850f64d6cea38
SHA256f6fc2e316358f54fec4eb6b52c445792efd2604d68934ef0895499f233325d07
SHA5123cd650dc3a1765911d7c1f6d28965565d6389fac229109938b6a1e103f31ca9e57599b7d41c93037ed95a29c551c57c6764a8b020ebc503969536c4f35402e3c
-
Filesize
34B
MD5d74249e681b2f0ccf7c61d0c5430218a
SHA10c4e809998fb149408cb6581967c4d71b8967edd
SHA25660f36aa79f436fd611e16c7cd8ca928e709712fda22fafccfc79fd8d66569569
SHA512b34bb8ec066bf443a6ae937f2c7b8170ad9efe3665f823b5c3aab1c470847a23a5cfb1fd07624230d885cf5c2b256bd9b098d8a887cabe51fd6531df50f34858