Overview
overview
8Static
static
3023e25fcb8...18.exe
windows7-x64
3023e25fcb8...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3IEDriver.dll
windows7-x64
1IEDriver.dll
windows10-2004-x64
1IEManager.dll
windows7-x64
1IEManager.dll
windows10-2004-x64
1IEMate.dll
windows7-x64
6IEMate.dll
windows10-2004-x64
6IEMateLib.dll
windows7-x64
1IEMateLib.dll
windows10-2004-x64
1IEMateLib2.dll
windows7-x64
1IEMateLib2.dll
windows10-2004-x64
1IEMateLib3.dll
windows7-x64
1IEMateLib3.dll
windows10-2004-x64
1IEProtect.dll
windows7-x64
1IEProtect.dll
windows10-2004-x64
1IERepair.exe
windows7-x64
IERepair.exe
windows10-2004-x64
NsPlugin.dll
windows7-x64
8NsPlugin.dll
windows10-2004-x64
1cab.dll
windows7-x64
1cab.dll
windows10-2004-x64
1regedit.dll
windows7-x64
1regedit.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
023e25fcb83acfeb125f4c79d3d44f5e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
023e25fcb83acfeb125f4c79d3d44f5e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
IEDriver.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
IEDriver.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
IEManager.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
IEManager.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
IEMate.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
IEMate.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
IEMateLib.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
IEMateLib.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
IEMateLib2.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
IEMateLib2.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
IEMateLib3.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
IEMateLib3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
IEProtect.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
IEProtect.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
IERepair.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
IERepair.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
NsPlugin.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
NsPlugin.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
cab.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
cab.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
regedit.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
regedit.dll
Resource
win10v2004-20240611-en
General
-
Target
IEMate.dll
-
Size
984KB
-
MD5
32349d46e6ad3bdfc0b6f2199ac7e7c9
-
SHA1
df29f87004d97afd5776d19c1ab57ed1f84eba4a
-
SHA256
59c319be8db500dafd09980088fcf23597c388e32d0be3010879a1e10f778220
-
SHA512
d3b4e23c988ac8b5f66cdd02b0be6ef6dd33149813c0f77ec91bb2899c6319c560efe46212fefd8640b22b3e28e10ec7079409d25b3598279122ba17c4fe7066
-
SSDEEP
12288:BnsWvjVLwMu20N+Dto3f7olmAWKfLbjNuOuL9JUxjRDTtA6bDhrmOTNPF:nvjVLwx+DyfsoGLbjNuOuLqhbpXR
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000000-9A18-40ED-9FE2-E92979DDE094} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000000-9A18-40ED-9FE2-E92979DDE094}\ = "IEMate" regsvr32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S\ = "c:\\users\\admin\\appdata\\local\\temp\\page\\saveimage.htm" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S\contexts = "243" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\URL = "http://www.baidu.com/baidu?tn=5gocom_3_dg&word={searchTerms}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\Codepage = "936" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\DisplayName = "百度" regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E318D91A-E3E4-4670-9382-A9F7FEFB826B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender.1\CLSID\ = "{D24F2003-CAE9-45AE-99DA-B2913D33F56D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost\CLSID\ = "{1037046C-EE73-46E9-B8C1-1DA827C973B4}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{F19926D0-05FC-4AE8-BB9C-FB7C43CEC00C}\ = "IeMate" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.CIEMateProtocol.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\ = "CIEMateProtocol Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\ProgID\ = "IeMate.CIEMateProtocol.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E318D91A-E3E4-4670-9382-A9F7FEFB826B}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0DA85F6-519D-4351-9C78-062EF5D850E5}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemate.status regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemate.status\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.CIEMateProtocol regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.CIEMateProtocol\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate\ = "JSIEMate Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\ = "ScriptHost Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.IeMateObj.1\CLSID\ = "{0000A11D-4F01-42B2-84CD-B26ADD453703}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender\ = "DomExtender Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD}\ = "IDocEventHandler" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate.1\ = "JSIEMate Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\VersionIndependentProgID\ = "IEMate.ScriptHost" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\AppID = "{F19926D0-05FC-4AE8-BB9C-FB7C43CEC00C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemate.status.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate\CLSID\ = "{81594BC9-4E7A-43AD-B404-2E21E01A8947}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\AppID = "{F19926D0-05FC-4AE8-BB9C-FB7C43CEC00C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ = "IJSIEMate" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.IeMateObj\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.CIEMateProtocol.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IEMate.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost.1\ = "ScriptHost Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0DA85F6-519D-4351-9C78-062EF5D850E5}\ = "IIeMateObj" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28 PID 1936 wrote to memory of 1596 1936 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\IEMate.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\IEMate.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD549e5f92439b2aacf993ed6c3e1ba43d2
SHA1c9fcc6389fde92e18402a83d5fd636cb2f149f0d
SHA256c5fe713ec5b1726094360832f8e2e5a30776507b75c3f8d6e33272d03fbf469f
SHA5127df8b3d67f76a2e3cea4283368114f9e27c19e4ee57df51160d6fbabc1f4eb50e09fd8a31ec222a3eff4f433d9c1f35459f742694ca4a9e28faa702a64a3bf97