Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 05:49

General

  • Target

    RunDict.exe

  • Size

    389KB

  • MD5

    46cf3f4e4154eba3a691de0850492c3d

  • SHA1

    2f8ae36888f013d56765d5e09036b3734861f214

  • SHA256

    801466b09c6cab683ee644b803e4078db52c5cd52f98f0e05a3fa736e83e800f

  • SHA512

    ea30eda94f7c221742f3a4850e0abaf4ff127e4474f7acf31b4392e5025c6ca220d59a51841c403e4d73bf45b255000f9b20672aaee820761a7fcdc87c5ddbf8

  • SSDEEP

    6144:SfaLwjN+iXdbYMYSTnz8wNW1NGv/HhQ1UCDICJlhXr7:Sx+it8m7NW3MHhQ1J5h77

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RunDict.exe
    "C:\Users\Admin\AppData\Local\Temp\RunDict.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe
      "C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe" start
      2⤵
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Windows\system32\pcaui.exe
        "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {5a82a30e-5da6-492d-8bb8-58d77df8d829} -a "YoudaoDictionary" -v "NetEase" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"
        3⤵
          PID:2896
        • C:\Users\Admin\AppData\Local\Temp\wordbook.exe
          hide deskdict:458800
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Youdao\DeskDict\ddupdate\dictupdate.xml

      Filesize

      5KB

      MD5

      1aaac195b685939e22902871f0337d26

      SHA1

      07ac75f91dce9f6743644d5f6036170216b9f26e

      SHA256

      a5adf51560694560eebe7348b86505f0685adabbf9bb4ebd92bb03280f993e2e

      SHA512

      31bdcd4b3664a3f177e700333881801e6050a53bce4d97dfd0391bae814e0cbd7869a85b004062bd6c3605c4c00aa676cd54bba705e7620c4cb705ce34e78f29

    • C:\Users\Admin\AppData\Local\Temp\guid.dat

      Filesize

      17B

      MD5

      d3f06e1acd6e1db936ef9042e0b2a190

      SHA1

      95e7deff5a2a0f15cf920a9b106d416c8ef9b5e3

      SHA256

      d7b68b54d81848a2a3b2ae6efa51bc1d60a9471736c336617a6c90d57b35e3b6

      SHA512

      b0be0d21113c9cfb86471e2c20b0c788af848ef05d45bb198a0208a747db9e5899b56a93004f17f62e022d68bfcba44686d3e68aaddd09b5164658ca7d8a7a7e

    • memory/3904-0-0x0000000000B50000-0x0000000000B73000-memory.dmp

      Filesize

      140KB