Overview
overview
7Static
static
3485fd9e0fa...18.exe
windows7-x64
7485fd9e0fa...18.exe
windows10-2004-x64
7$PLUGINSDI...IE.exe
windows7-x64
7$PLUGINSDI...IE.exe
windows10-2004-x64
7menu_en.htm
windows7-x64
1menu_en.htm
windows10-2004-x64
1menu_ru.htm
windows7-x64
1menu_ru.htm
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7wit4ie.dll
windows7-x64
6wit4ie.dll
windows10-2004-x64
6witapi.js
windows7-x64
3witapi.js
windows10-2004-x64
3witmain.js
windows7-x64
3witmain.js
windows10-2004-x64
3$PLUGINSDI...s.html
windows7-x64
1$PLUGINSDI...s.html
windows10-2004-x64
1$PLUGINSDI...n.html
windows7-x64
1$PLUGINSDI...n.html
windows10-2004-x64
1$PLUGINSDI...l.html
windows7-x64
1$PLUGINSDI...l.html
windows10-2004-x64
1$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...l.html
windows7-x64
1$PLUGINSDI...l.html
windows10-2004-x64
1$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
1$PLUGINSDI...ss.dll
windows10-2004-x64
1$PLUGINSDI...r.html
windows7-x64
1$PLUGINSDI...r.html
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
485fd9e0fa159847c99fae2d1463a838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
485fd9e0fa159847c99fae2d1463a838_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ChameleonTomIE.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ChameleonTomIE.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
menu_en.htm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
menu_en.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
menu_ru.htm
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
menu_ru.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
wit4ie.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
wit4ie.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
witapi.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
witapi.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
witmain.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
witmain.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Components.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Components.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/Confirmation.html
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/Confirmation.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Final.html
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Final.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/Install.html
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/Install.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/Progress.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/Progress.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/Register.html
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/Register.html
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/ChameleonTomIE.exe
-
Size
185KB
-
MD5
6ac6f46f4202ae21f46fd0068a962d3e
-
SHA1
9e286b8f0f87df399f7a386c672d8d1473620b73
-
SHA256
db11bb695712303ff8c9d0abe08810bdd0b046794c26f342f22706e24446442b
-
SHA512
fb5906550c6de64b23deed80761ac7edc2bd0ee925656556dcd105aaeff3ebcc79cce849c70b8499ceae3f5be244e8dd0ea3cc6a12caa79e4e44243a57f3b3f0
-
SSDEEP
3072:F85FnEA0PNdJl45vHHtJICAohuq4sINZGMqEcyi5/rNB8iYUjt8A47:FgFEN9IHNuCAAunnG1RxLW7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 808 ChameleonTomIE.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F} ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\ = "wit for ie" ChameleonTomIE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\NoExplorer = "1" ChameleonTomIE.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\ChameleonTom\uninstall.exe ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\wit4ie.dll ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\ct.htm ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\hoticon.ico ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\menu_ru.htm ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\about.gif ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\witapi.js ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\witmain.js ChameleonTomIE.exe File created C:\Program Files (x86)\ChameleonTom\menu_en.htm ChameleonTomIE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\Script = "C:\\Program Files (x86)\\ChameleonTom\\ct.htm" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737} ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\ButtonText = "ChameleonTom" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\MenuStatusBar = "ChameleonTom" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\HotIcon = "C:\\Program Files (x86)\\ChameleonTom\\hoticon.ico" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\MenuText = "ChameleonTom" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\Default Visible = "Yes" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\Icon = "C:\\Program Files (x86)\\ChameleonTom\\hoticon.ico" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{14CD42DD-ABCD-3586-DCAB-40E3693E3737}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" ChameleonTomIE.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F} ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\ = "WitBHO Class" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\TypeLib ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\0 ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO\CLSID ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\Programmable ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\0\win32 ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\InprocServer32\ = "C:\\Program Files (x86)\\ChameleonTom\\wit4ie.dll" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib\ = "{E7767193-0A2F-4AFE-BAF4-288366162E48}" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ProxyStubClsid32 ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO\CurVer\ = "wit4ie.WitBHO.1" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0 ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\ = "wit4ie 1.0 Type Library" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7} ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{20EDC024-43C5-423E-B7F5-FD93523E0D9F} ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\ProgID ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\ChameleonTom" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib\ = "{E7767193-0A2F-4AFE-BAF4-288366162E48}" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\HELPDIR ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib\Version = "1.0" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{20EDC024-43C5-423E-B7F5-FD93523E0D9F}\ = "wit4ie" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO.1\CLSID ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO.1\CLSID\ = "{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\TypeLib\ = "{E7767193-0A2F-4AFE-BAF4-288366162E48}" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO\CLSID\ = "{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\ProgID\ = "wit4ie.WitBHO.1" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\FLAGS\ = "0" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ = "IWitBHO" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ProxyStubClsid32 ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\wit4ie.DLL ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO.1\ = "WitBHO Class" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO\CurVer ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\TypeLib\Version = "1.0" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO\ = "WitBHO Class" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\VersionIndependentProgID ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\InprocServer32 ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\0\win32\ = "C:\\Program Files (x86)\\ChameleonTom\\wit4ie.dll" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7} ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\wit4ie.DLL\AppID = "{20EDC024-43C5-423E-B7F5-FD93523E0D9F}" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wit4ie.WitBHO.1 ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\InprocServer32\ThreadingModel = "Apartment" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ = "IWitBHO" ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75ED56AF-4DC9-4243-A30C-4EF4DD0CA28F}\VersionIndependentProgID\ = "wit4ie.WitBHO" ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48} ChameleonTomIE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7767193-0A2F-4AFE-BAF4-288366162E48}\1.0\FLAGS ChameleonTomIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9732E648-5755-43ED-9003-9E835D22CFE7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ChameleonTomIE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ChameleonTomIE.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ChameleonTomIE.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD56b4513d6395fc100d3bf98f3428286f2
SHA1321ae2a5298f79c6f27ef99c4a4c913c4284d31f
SHA256ac3f100228ea22017c2bf09796a046bbd3710cc3fa843b5ebc46a94d9d9bd2b0
SHA51214a7b9ad09b45c6b5c13246dbedcf0915468dce26ced5851fe7d09c495812ae3cccee51d9716ef76e8a22423b32f31cc489f644dd904bafead257dea0618c9f2