Overview
overview
7Static
static
3YoudaoDict_crsky.exe
windows7-x64
7YoudaoDict_crsky.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
3Acrobat2Dict.dll
windows10-2004-x64
3CrashRpt.dll
windows7-x64
3CrashRpt.dll
windows10-2004-x64
3InstallDaemon.exe
windows7-x64
3InstallDaemon.exe
windows10-2004-x64
3Monitor.exe
windows7-x64
3Monitor.exe
windows10-2004-x64
3RunDict.exe
windows7-x64
7RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
3TextExtrac...32.dll
windows10-2004-x64
3TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
3WordBook.exe
windows10-2004-x64
3WordStroke...32.dll
windows7-x64
3WordStroke...32.dll
windows10-2004-x64
3WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1XDLL.dll
windows7-x64
3XDLL.dll
windows10-2004-x64
3background.html
windows7-x64
3background.html
windows10-2004-x64
3lookup.js
windows7-x64
3lookup.js
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
YoudaoDict_crsky.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
YoudaoDict_crsky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
CrashRpt.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
CrashRpt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
InstallDaemon.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
InstallDaemon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Monitor.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Monitor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
RunDict.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
TextExtractorImpl32.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
TextExtractorImpl64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
WordBook.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WordStrokeHelper32.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
WordStrokeHelper64.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
XDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
background.html
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
background.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
lookup.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
lookup.js
Resource
win10v2004-20240802-en
General
-
Target
RunDict.exe
-
Size
389KB
-
MD5
46cf3f4e4154eba3a691de0850492c3d
-
SHA1
2f8ae36888f013d56765d5e09036b3734861f214
-
SHA256
801466b09c6cab683ee644b803e4078db52c5cd52f98f0e05a3fa736e83e800f
-
SHA512
ea30eda94f7c221742f3a4850e0abaf4ff127e4474f7acf31b4392e5025c6ca220d59a51841c403e4d73bf45b255000f9b20672aaee820761a7fcdc87c5ddbf8
-
SSDEEP
6144:SfaLwjN+iXdbYMYSTnz8wNW1NGv/HhQ1UCDICJlhXr7:Sx+it8m7NW3MHhQ1J5h77
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\YodaoDict.api YodaoDict.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDict.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YodaoDict.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordbook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main YodaoDict.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch YodaoDict.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" YodaoDict.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\VersionIndependentProgID\ = "YoudaoGetWord64.Connect" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\ = "YoudaoGetWord 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CurVer\ = "YoudaoGetWord64.Connect.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\TypeLib\ = "{55684B24-475C-4969-8C82-B498B5A53596}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ProgID\ = "YoudaoGetWord64.Connect.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YoudaoGetWord64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CLSID\ = "{07473267-2FBF-468D-8C7D-A9DB6211F5F2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect.1\CLSID\ = "{07473267-2FBF-468D-8C7D-A9DB6211F5F2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\ = "Connect Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CLSID\ = "{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CurVer\ = "YoudaoGetWord32.Connect.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\VersionIndependentProgID\ = "YoudaoGetWord32.Connect" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord64.Connect\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect.1\CLSID\ = "{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\TypeLib\ = "{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0\win64\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YoudaoGetWord64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\ = "YoudaoGetWord 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ProgID\ = "YoudaoGetWord32.Connect.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ = "Connect Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YoudaoGetWord32.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YoudaoGetWord32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0\win64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoudaoGetWord32.Connect\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BB241B94-028A-441D-B9EB-B9AD3FDF2D9A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7659C504-025E-4FB5-A9EC-8D2A42C9B2AF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{07473267-2FBF-468D-8C7D-A9DB6211F5F2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{55684B24-475C-4969-8C82-B498B5A53596}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1776 YodaoDict.exe Token: SeIncBasePriorityPrivilege 1776 YodaoDict.exe Token: 33 1776 YodaoDict.exe Token: SeIncBasePriorityPrivilege 1776 YodaoDict.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 1776 YodaoDict.exe 2232 wordbook.exe 2232 wordbook.exe 2232 wordbook.exe 2232 wordbook.exe 1776 YodaoDict.exe 3044 YoudaoEH.exe 3044 YoudaoEH.exe 1776 YodaoDict.exe 3004 YoudaoWSH.exe 1776 YodaoDict.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1776 1932 RunDict.exe 30 PID 1932 wrote to memory of 1776 1932 RunDict.exe 30 PID 1932 wrote to memory of 1776 1932 RunDict.exe 30 PID 1932 wrote to memory of 1776 1932 RunDict.exe 30 PID 1776 wrote to memory of 2232 1776 YodaoDict.exe 31 PID 1776 wrote to memory of 2232 1776 YodaoDict.exe 31 PID 1776 wrote to memory of 2232 1776 YodaoDict.exe 31 PID 1776 wrote to memory of 2232 1776 YodaoDict.exe 31 PID 1776 wrote to memory of 3044 1776 YodaoDict.exe 33 PID 1776 wrote to memory of 3044 1776 YodaoDict.exe 33 PID 1776 wrote to memory of 3044 1776 YodaoDict.exe 33 PID 1776 wrote to memory of 3044 1776 YodaoDict.exe 33 PID 1776 wrote to memory of 3004 1776 YodaoDict.exe 34 PID 1776 wrote to memory of 3004 1776 YodaoDict.exe 34 PID 1776 wrote to memory of 3004 1776 YodaoDict.exe 34 PID 1776 wrote to memory of 3004 1776 YodaoDict.exe 34 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 1064 1776 YodaoDict.exe 35 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 1776 wrote to memory of 340 1776 YodaoDict.exe 36 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37 PID 340 wrote to memory of 2644 340 regsvr32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\RunDict.exe"C:\Users\Admin\AppData\Local\Temp\RunDict.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe" start2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\wordbook.exehide deskdict:1969743⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"C:\Users\Admin\AppData\Local\Temp\YoudaoEH.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\YoudaoWSH.exeC:\Users\Admin\AppData\Local\Temp\YoudaoWSH.exe 17763⤵
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\Temp\YoudaoGetWord32.dll" /s3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1064
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\Temp\YoudaoGetWord64.dll" /s3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\system32\regsvr32.exe"C:\Users\Admin\AppData\Local\Temp\YoudaoGetWord64.dll" /s4⤵
- Modifies registry class
PID:2644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51aaac195b685939e22902871f0337d26
SHA107ac75f91dce9f6743644d5f6036170216b9f26e
SHA256a5adf51560694560eebe7348b86505f0685adabbf9bb4ebd92bb03280f993e2e
SHA51231bdcd4b3664a3f177e700333881801e6050a53bce4d97dfd0391bae814e0cbd7869a85b004062bd6c3605c4c00aa676cd54bba705e7620c4cb705ce34e78f29
-
Filesize
17B
MD565df01986b2312447ce98d405298bcbb
SHA1473867a75c7a4c5e31792dbfc33d77d72855cbd0
SHA2565d59526b8d5185b6a14fae0814537ee1dd15126b5b148f058475a744e506a1da
SHA5129b9d297acc1f6fdb4b52633d23c9356e3fe21be78da2dbcfd874b34fd045b0497b054ae7f2c8e3ad103bc7a478ce5781523e4fc31f3a0c3ac837ecc853bc39ea