Overview
overview
6Static
static
3c0c0d367be...18.exe
windows7-x64
3c0c0d367be...18.exe
windows10-2004-x64
3$APPDATA/I...ld.exe
windows7-x64
3$APPDATA/I...ld.exe
windows10-2004-x64
3$APPDATA/I...bc.dll
windows7-x64
3$APPDATA/I...bc.dll
windows10-2004-x64
3$APPDATA/I...ld.dll
windows7-x64
3$APPDATA/I...ld.dll
windows10-2004-x64
3$APPDATA/I...sp.dll
windows7-x64
3$APPDATA/I...sp.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3IEDriver.dll
windows7-x64
3IEDriver.dll
windows10-2004-x64
3IEManager.dll
windows7-x64
3IEManager.dll
windows10-2004-x64
3IEMate.dll
windows7-x64
6IEMate.dll
windows10-2004-x64
6IEMateLib.dll
windows7-x64
1IEMateLib.dll
windows10-2004-x64
1IEMateLib2.dll
windows7-x64
1IEMateLib2.dll
windows10-2004-x64
1IEMateLib3.dll
windows7-x64
1IEMateLib3.dll
windows10-2004-x64
1IEPromotion.dll
windows7-x64
3IEPromotion.dll
windows10-2004-x64
3IEProtect.dll
windows7-x64
3IEProtect.dll
windows10-2004-x64
3IERepair.exe
windows7-x64
3IERepair.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
c0c0d367be36a946ed9f7020b714e076_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0c0d367be36a946ed9f7020b714e076_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/IESafer/KSWebShield.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$APPDATA/IESafer/KSWebShield.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$APPDATA/IESafer/kswbc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$APPDATA/IESafer/kswbc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$APPDATA/IESafer/kswebshield.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$APPDATA/IESafer/kswebshield.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$APPDATA/IESafer/kwssp.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$APPDATA/IESafer/kwssp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
IEDriver.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
IEDriver.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
IEManager.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
IEManager.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
IEMate.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
IEMate.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
IEMateLib.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
IEMateLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
IEMateLib2.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
IEMateLib2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
IEMateLib3.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
IEMateLib3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
IEPromotion.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
IEPromotion.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
IEProtect.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
IEProtect.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
IERepair.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
IERepair.exe
Resource
win10v2004-20240802-en
General
-
Target
IEMate.dll
-
Size
1004KB
-
MD5
271ee5037a241ae79273434bfd62d7d1
-
SHA1
d6550f3472522f0b185a6a4771a0f1d63f2a1023
-
SHA256
1e227a4cd02d299642ff73fb84175d8e2880ef84ac696ed2ea4b4cb30b50c848
-
SHA512
4bae6d480a05c4a3aee9931c9f08d04e50d5b28ffc5cd1af71bb953ee0009f46873b84a96b6f037de9adbe35b2242dd5cb42ecdcdd899781957bc3389aaf497b
-
SSDEEP
12288:uIBNRZas1idIhde60KdJkHLyS5PgYNU2zVdoYLb/qkclcL/TvZVv89rAto1OnW29:7Nnv11PrdOHLyS54YK2zV4u/rZ4wGOL
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000000-9A18-40ED-9FE2-E92979DDE094} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000000-9A18-40ED-9FE2-E92979DDE094}\ = "IESafer" regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S\contexts = "243" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C} regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\Codepage = "936" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\DisplayName = "百度" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}\URL = "http://www.baidu.com/baidu?tn=iefix_dg&word={searchTerms}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{5606FFF9-DA61-4B40-92AF-E622ADB4DC2C}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\MenuExt\页面截图... Alt+S\ = "c:\\users\\admin\\appdata\\local\\temp\\page\\saveimage.htm" regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0DA85F6-519D-4351-9C78-062EF5D850E5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-9A18-40ED-9FE2-E92979DDE094} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate\CurVer\ = "IEMate.JSIEMate.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.IeMateObj\CLSID\ = "{0000A11D-4F01-42B2-84CD-B26ADD453703}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E318D91A-E3E4-4670-9382-A9F7FEFB826B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IEMate.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50982D5A-B16D-4E8A-97B7-60DBE84FCEFD}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IEMate.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ = "IJSIEMate" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D0281551-6711-496C-92D3-8B0C1BE0CCAD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E318D91A-E3E4-4670-9382-A9F7FEFB826B}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{44C5AE91-A034-473D-9518-CC9F053D27CA}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E318D91A-E3E4-4670-9382-A9F7FEFB826B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0DA85F6-519D-4351-9C78-062EF5D850E5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98}\ = "_IScriptHostEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.IeMateObj.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.IeMateObj.1\ = "¿ì½ÝËÑË÷À¸" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0000A11D-4F01-42B2-84CD-B26ADD453703}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.JSIEMate\ = "JSIEMate Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\ = "JSIEMate Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost\ = "ScriptHost Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81594BC9-4E7A-43AD-B404-2E21E01A8947}\TypeLib\ = "{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.DocEventHandler\ = "DocEventHandler Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{50AD7E22-9772-4A25-8E88-00B6CDAF71A5}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IeMate.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemate.status.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.ScriptHost\CLSID\ = "{1037046C-EE73-46E9-B8C1-1DA827C973B4}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31D49D16-9FC0-4E62-ADF9-681E7103F145} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D24F2003-CAE9-45AE-99DA-B2913D33F56D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMate.DocEventHandler.1\CLSID\ = "{E318D91A-E3E4-4670-9382-A9F7FEFB826B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1037046C-EE73-46E9-B8C1-1DA827C973B4}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IEMate.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B5EF1414-9E2C-4F20-95F4-7ABEF377E752}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1183FD5-5692-459B-BCC6-C6FD180F1C98}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0000A11D-4F01-42B2-84CD-B26ADD453703}\ = "¿ì½ÝËÑË÷À¸" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00000000-9A18-40ED-9FE2-E92979DDE094}\VersionIndependentProgID\ = "IESafer.status" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IeMate.DomExtender\CLSID\ = "{D24F2003-CAE9-45AE-99DA-B2913D33F56D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A5FC50D-D9D7-4ADA-ADFB-08F699D1D52F}\TypeLib\Version = "1.0" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30 PID 2644 wrote to memory of 3052 2644 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\IEMate.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\IEMate.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cb290bb202865282e67ec573a98941d6
SHA178f51a4d823c91db8cc8b874686524ffeaa56b0d
SHA2560ea865442bfbf646a4ab7ef9bd17174cc6ed5a4af861361dab53596d2cb50465
SHA512b7a070b85714d08804f2afc059908196bf1e2542369fe2e4f1738cff7ea51faad148300789e6017d37b978011e0d56976a30b1f07865c0e20751d22d82a07bde