Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 15:19

General

  • Target

    YoudaoDict_fanyiweb_uia.exe

  • Size

    146.6MB

  • MD5

    7c1427add3279a3e808a72a21401d1ff

  • SHA1

    3c90f4c761b32db39d223f38a72d7df654b91c26

  • SHA256

    74f95519b3be1cad91d50eb40349eb02d77dd7228c79c3841fcca9475fdda2b0

  • SHA512

    b258a46b45811c0d05c8acb255d3f56e5adc457b7766d91fedee9c6cbe0866acb691e2a5485c9da8df9d07103b420179b1c387178027c0e82c5b4cd6aa55e1da

  • SSDEEP

    3145728:LrJWeuCMi8mRlR1QxJ/wCFeO7c30JPxzNW9piyj4w5Olvt0RXxO1:LrJWzC78+c/wCFeO700JPxhW7iyjb5OT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YoudaoDict_fanyiweb_uia.exe
    "C:\Users\Admin\AppData\Local\Temp\YoudaoDict_fanyiweb_uia.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\is-9UB5M.tmp\YoudaoDict_fanyiweb_uia.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9UB5M.tmp\YoudaoDict_fanyiweb_uia.tmp" /SL5="$30152,152943676,730624,C:\Users\Admin\AppData\Local\Temp\YoudaoDict_fanyiweb_uia.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Program Files (x86)\dict\dict\Application\YoudaoDict_fanyiweb_navigation.exe
        "C:\Program Files (x86)\dict\dict\Application\YoudaoDict_fanyiweb_navigation.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1708
      • C:\Program Files (x86)\dict\dict\Application\Stable\YdExcelAddIncs.exe
        "C:\Program Files (x86)\dict\dict\Application\Stable\YdExcelAddIncs.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\dict\dict\Application\10.3.0.0\resultui\html\css\is-1HHID.tmp

          Filesize

          584B

          MD5

          3f7da09311b9632df92173623aaa6145

          SHA1

          b02c155b2f70671599965448d64a6f6479dbf0ef

          SHA256

          1105b229c1437d45db30e0bbcc8736fed14ddfdfe957d05f590e0530a7d0925b

          SHA512

          d477e6849946eb88544eefbd7913566b2675fbf00d7fff134049a1376de3d88d65316245d43680f639c00470da44d84bcaa3c611d59e2598c321f48d5dc053fe

        • C:\Program Files (x86)\dict\dict\Application\10.3.0.0\resultui\html\js\is-BTMQ0.tmp

          Filesize

          120B

          MD5

          3df54bba2137ec524f3fb39f2c61461a

          SHA1

          0c22a43aa3197066cef88cc7d507b4c7de33fcc1

          SHA256

          47282a6fa1469e2d7bc8936d167c17ebf0fd800941104dd15097945208ccb501

          SHA512

          e7462c492ff1eebe0a2843a70b64bcfd196f22163e87fc0774b1904553aa66524b511bab0d43d6a580863982ebd74162879431ac8e401a97e378c3a2d3fbf283

        • C:\Program Files (x86)\dict\dict\Application\10.3.0.0\resultui\html\ydDict\is-V2NLV.tmp

          Filesize

          8KB

          MD5

          82fbd90ae0a344cd29e538111ca3ad0e

          SHA1

          f386c8168304dd744bac83f787606489b1163ed6

          SHA256

          ae325f83cc63d67c533dc8d5406f7f502c61d2ab9fdb7befd511ce5ebc6ccbf1

          SHA512

          f57fdaa5b368cfb08bf134123253f2ca664460af2b28d63576568a8112c7c86637afe82adcfc659cd60c5cf6440bbf9e33389bb5a2bc8cf7968dc0d4c4c12a28

        • C:\Program Files (x86)\dict\dict\Application\Stable\VCRUNTIME140.dll

          Filesize

          78KB

          MD5

          1b171f9a428c44acf85f89989007c328

          SHA1

          6f25a874d6cbf8158cb7c491dcedaa81ceaebbae

          SHA256

          9d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c

          SHA512

          99a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1

        • C:\Program Files (x86)\dict\dict\Application\Stable\YdExcelAddIncs.exe

          Filesize

          95KB

          MD5

          d0f23e47419a7f1b22197fc1ffb03e39

          SHA1

          19f60304ceeee3302bc8e4cf755ecffa8ef97056

          SHA256

          a6402ac7b177d0947396e1aef8b39377e07b65f8cc510e6d137725fe723e32e6

          SHA512

          3768e163fa02e6e27defeb7cf520a8e7f6386d5f4b93dddb08d870da8a6b289d3e25f184904bbf7b92059d2aef6061f501a503e5752f13678ededada07212023

        • C:\Program Files (x86)\dict\dict\Application\Stable\python36.dll

          Filesize

          948KB

          MD5

          664047844c7df994cfc22257fd91f77f

          SHA1

          6687cec1dcf749e57d88aa4a9ee52c42679ba41d

          SHA256

          3f62a7b06b643aeed464c234513d8c72bdeec189604d5b883160abafa11b96c9

          SHA512

          8ef408a0a202ccaf9c8fab0035fcaa21cd0ba52ae5def7c6e8cb0315d35a078a87db47966f645048d6aa2535872228a39f5f4d5ff0b61d19059a950e04765731

        • C:\Users\Admin\AppData\Local\Temp\is-9UB5M.tmp\YoudaoDict_fanyiweb_uia.tmp

          Filesize

          2.4MB

          MD5

          1d47c25c177fc1f06242876f371d9976

          SHA1

          339ce75996409f6820a5eaf537a5ab83b8e27f20

          SHA256

          a00339e102ea0c367d3269bbeeaf62341a4e489740745d066b380b0179ae38ee

          SHA512

          f01a9272397e6204bca0b9ec07f7db6be79bb803e8e782d52d264ed4bd79918db3b078bef39c67f4a2786ad597f8b4dbdd790eed50b7b3ef2bc43b3ba16e7efb

        • C:\Users\Admin\AppData\Local\Temp\nsy5514.tmp\btn_agree.bmp

          Filesize

          38KB

          MD5

          dab018047c171165c18329d5c59b617e

          SHA1

          88848ac4aceb7358f13d225de6d4fd0a5696517a

          SHA256

          1cf0d9e908c3134ffce859483504420578ee8ccda399c20ecc035d1e4da93734

          SHA512

          1f6c50885290a3b983b7b8ac4bfec546d74acf2c50bfd0d245164a5ee149fa28a2871d545286108345c055c4f86f2b115509fcf74a6b60bc3f814c1c1635162d

        • C:\Users\Admin\AppData\Local\Temp\nsy5514.tmp\btn_disagree.bmp

          Filesize

          38KB

          MD5

          5f7b90c87ea0517771862fae5f11ce94

          SHA1

          fc9f195e888d960139278c04a0e78996c6442d5b

          SHA256

          f906101e512c3119e71b6949d68ac01c8fdb5ef06f4c73eaef9a3f0bd6021ce2

          SHA512

          dc08461f1e823d898f5ba42c9d1a131f599adbcb0af28c5de950a01ec74015d3da933e675986b71dde09cc74e00689ebe5f5f6cff857d335322f18d3f385edf0

        • C:\Users\Admin\AppData\Local\Temp\nsy5514.tmp\checkbox_null.bmp

          Filesize

          3KB

          MD5

          5754c67775c3f4f50a4780b3bca026b1

          SHA1

          3e95c72c13d6175ef275280fe270d678acee46e9

          SHA256

          2a5d67757f61ca00227e9b482a7b15365ba836c11f5b7d723b650e6d4108e739

          SHA512

          df6744556a24d4f6b907fc6126035adca4d3ce8aba52b26112e59b24ebfc5c4e079ee8ed74df3f28fc62cc3e207041cf8fb6b6a84ec58125122c214924e0a97f

        • C:\Users\Admin\AppData\Local\Temp\nsy5514.tmp\slide6.bmp

          Filesize

          908KB

          MD5

          3d3ec6392cf9a8b408569a3dd4cd3ce8

          SHA1

          95ff4346eb20d9239c37e6538bb8df8542d3300a

          SHA256

          818f2cdb763f5af1884485cffef51f192bc895132a4fdff5009935e8348f8371

          SHA512

          e017cfd88c50c496ac86084a43a80eb3f1ec61c6397a67da2978cbb1867a4b30f563f1b4f319d00742b84df486e841804b82949e3131c7d77b7f63975dece505

        • \Users\Admin\AppData\Local\Temp\nsy5514.tmp\LockedList.dll

          Filesize

          95KB

          MD5

          5a94bf8916a11b5fe94aca44886c9393

          SHA1

          820d9c5e3365e323d6f43d3cce26fd9d2ea48b93

          SHA256

          0b1e46044b580121f30bedb2b5412d3170c6afaa7800d702ee71f7666904236d

          SHA512

          79cba3dcb249d88a6a6cfb4efcb65cc42a240af4edb14bcc7546d9c701a7b642362f9fe0488691a8906607ecc76f7b5ee5a4282fa057053b258eea143ac90c20

        • \Users\Admin\AppData\Local\Temp\nsy5514.tmp\OP_WndProc.dll

          Filesize

          48KB

          MD5

          765cf74fc709fb3450fa71aac44e7f53

          SHA1

          b423271b4faac68f88fef15fa4697cf0149bad85

          SHA256

          cc46ab0bf6b19a2601cd002b06769ad08baf4ed0b14e8728973f8af96bdee57e

          SHA512

          0c347d9a2960a17f8ec9b78ede972bf3cf6567fd079a6aa5a6ac262ac227bfd36acc53a7a127fd7f387dec9f4509f4f3f754b10853a213e993ea1573e74ed7e6

        • \Users\Admin\AppData\Local\Temp\nsy5514.tmp\SkinBtn.dll

          Filesize

          4KB

          MD5

          29818862640ac659ce520c9c64e63e9e

          SHA1

          485e1e6cc552fa4f05fb767043b1e7c9eb80be64

          SHA256

          e96afa894a995a6097a405df76155a7a39962ff6cae7a59d89a25e5a34ab9eeb

          SHA512

          ebb94eb21e060fb90ec9c86787eada42c7c9e1e7628ea4b16d3c7b414f554a94d5e4f4abe0e4ee30fddf4f904fd3002770a9b967fbd0feeca353e21079777057

        • \Users\Admin\AppData\Local\Temp\nsy5514.tmp\System.dll

          Filesize

          11KB

          MD5

          bf712f32249029466fa86756f5546950

          SHA1

          75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

          SHA256

          7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

          SHA512

          13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

        • \Users\Admin\AppData\Local\Temp\nsy5514.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          4ccc4a742d4423f2f0ed744fd9c81f63

          SHA1

          704f00a1acc327fd879cf75fc90d0b8f927c36bc

          SHA256

          416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6

          SHA512

          790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb

        • memory/2364-0-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/2364-2-0x0000000000401000-0x00000000004A8000-memory.dmp

          Filesize

          668KB

        • memory/2364-134-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/2364-2162-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/2912-136-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB

        • memory/2912-8-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB

        • memory/2912-135-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB

        • memory/2912-2157-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB

        • memory/2912-2159-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB

        • memory/2912-2161-0x0000000000400000-0x000000000067F000-memory.dmp

          Filesize

          2.5MB