Overview
overview
7Static
static
3YoudaoDict_crsky.exe
windows7-x64
7YoudaoDict_crsky.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
3Acrobat2Dict.dll
windows10-2004-x64
3CrashRpt.dll
windows7-x64
3CrashRpt.dll
windows10-2004-x64
3InstallDaemon.exe
windows7-x64
3InstallDaemon.exe
windows10-2004-x64
3Monitor.exe
windows7-x64
3Monitor.exe
windows10-2004-x64
3RunDict.exe
windows7-x64
7RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
3TextExtrac...32.dll
windows10-2004-x64
3TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
3WordBook.exe
windows10-2004-x64
3WordStroke...32.dll
windows7-x64
3WordStroke...32.dll
windows10-2004-x64
3WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1XDLL.dll
windows7-x64
3XDLL.dll
windows10-2004-x64
3background.html
windows7-x64
3background.html
windows10-2004-x64
3lookup.js
windows7-x64
3lookup.js
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
YoudaoDict_crsky.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
YoudaoDict_crsky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
CrashRpt.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
CrashRpt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
InstallDaemon.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
InstallDaemon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Monitor.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Monitor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RunDict.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
RunDict.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
TextExtractorImpl32.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
TextExtractorImpl64.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
WordBook.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
WordBook.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WordStrokeHelper32.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
WordStrokeHelper64.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
XDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
XDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
background.html
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
background.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
lookup.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
lookup.js
Resource
win10v2004-20240802-en
General
-
Target
RunDict.exe
-
Size
389KB
-
MD5
46cf3f4e4154eba3a691de0850492c3d
-
SHA1
2f8ae36888f013d56765d5e09036b3734861f214
-
SHA256
801466b09c6cab683ee644b803e4078db52c5cd52f98f0e05a3fa736e83e800f
-
SHA512
ea30eda94f7c221742f3a4850e0abaf4ff127e4474f7acf31b4392e5025c6ca220d59a51841c403e4d73bf45b255000f9b20672aaee820761a7fcdc87c5ddbf8
-
SSDEEP
6144:SfaLwjN+iXdbYMYSTnz8wNW1NGv/HhQ1UCDICJlhXr7:Sx+it8m7NW3MHhQ1J5h77
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation RunDict.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\YodaoDict.api YodaoDict.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\YodaoDict.api YodaoDict.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDict.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YodaoDict.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordbook.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch YodaoDict.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" YodaoDict.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\IESettingSync YodaoDict.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" YodaoDict.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3904 YodaoDict.exe Token: SeIncBasePriorityPrivilege 3904 YodaoDict.exe Token: 33 3904 YodaoDict.exe Token: SeIncBasePriorityPrivilege 3904 YodaoDict.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 3904 YodaoDict.exe 1616 wordbook.exe 1616 wordbook.exe 1616 wordbook.exe 1616 wordbook.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3904 1912 RunDict.exe 88 PID 1912 wrote to memory of 3904 1912 RunDict.exe 88 PID 1912 wrote to memory of 3904 1912 RunDict.exe 88 PID 3904 wrote to memory of 2896 3904 YodaoDict.exe 89 PID 3904 wrote to memory of 2896 3904 YodaoDict.exe 89 PID 3904 wrote to memory of 1616 3904 YodaoDict.exe 91 PID 3904 wrote to memory of 1616 3904 YodaoDict.exe 91 PID 3904 wrote to memory of 1616 3904 YodaoDict.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\RunDict.exe"C:\Users\Admin\AppData\Local\Temp\RunDict.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe" start2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {5a82a30e-5da6-492d-8bb8-58d77df8d829} -a "YoudaoDictionary" -v "NetEase" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\YodaoDict.exe"3⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\wordbook.exehide deskdict:4588003⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51aaac195b685939e22902871f0337d26
SHA107ac75f91dce9f6743644d5f6036170216b9f26e
SHA256a5adf51560694560eebe7348b86505f0685adabbf9bb4ebd92bb03280f993e2e
SHA51231bdcd4b3664a3f177e700333881801e6050a53bce4d97dfd0391bae814e0cbd7869a85b004062bd6c3605c4c00aa676cd54bba705e7620c4cb705ce34e78f29
-
Filesize
17B
MD5d3f06e1acd6e1db936ef9042e0b2a190
SHA195e7deff5a2a0f15cf920a9b106d416c8ef9b5e3
SHA256d7b68b54d81848a2a3b2ae6efa51bc1d60a9471736c336617a6c90d57b35e3b6
SHA512b0be0d21113c9cfb86471e2c20b0c788af848ef05d45bb198a0208a747db9e5899b56a93004f17f62e022d68bfcba44686d3e68aaddd09b5164658ca7d8a7a7e