Play interactive tourEdit tour

Analysis Report ietabhelper.exe

Overview

General Information

Sample Name:ietabhelper.exe
Analysis ID:335603
MD5:bc63e7f22cd5ce2ebd6f114348073623
SHA1:665a18811dc981c1ee5b0258823216aab40cc2f8
SHA256:0e28906292348cbe1f6ad70aa943ed4c71615fbbccf702123639c535e26dd98b

Most interesting Screenshot:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains strange resources
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • ietabhelper.exe (PID: 5464 cmdline: 'C:\Users\user\Desktop\ietabhelper.exe' MD5: BC63E7F22CD5CE2EBD6F114348073623)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C79B10 lstrlenA,MultiByteToWideChar,FindFirstFileExW,lstrlenW,WideCharToMultiByte,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C797B0 FindFirstFileExW,FindClose,FindNextFileW,FindNextFileW,FindNextFileW,FindClose,DeleteFileW,RemoveDirectoryW,FindClose,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C5D840 URLDownloadToCacheFileW,
Source: ietabhelper.exeString found in binary or memory: http://certificates.godaddy.com/repository/0v
Source: ietabhelper.exeString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
Source: ietabhelper.exeString found in binary or memory: http://certs.godaddy.com/repository/1301
Source: ietabhelper.exeString found in binary or memory: http://crl.godaddy.com/gdig2s5-0.crl0S
Source: ietabhelper.exeString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
Source: ietabhelper.exeString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
Source: ietabhelper.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: ietabhelper.exeString found in binary or memory: http://ocsp.godaddy.com/0
Source: ietabhelper.exeString found in binary or memory: http://ocsp.godaddy.com/02
Source: ietabhelper.exeString found in binary or memory: http://ocsp.godaddy.com/05
Source: ietabhelper.exeString found in binary or memory: http://ocsp.thawte.com0
Source: ietabhelper.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: ietabhelper.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: ietabhelper.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: ietabhelper.exeString found in binary or memory: https://certs.godaddy.com/repository/0
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C5FB50 GetKeyState,GetKeyState,GetKeyState,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C78FD0
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8F0C2
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8E0D2
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C5D050
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C72190
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C6B100
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C9A20F
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C7F3B0
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8934E
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C63350
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C9832B
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C6E490
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C994AB
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C71450
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C84610
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8975A
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C9886F
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C88AA5
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C6BB80
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C89B7A
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8AC85
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C98DB3
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C88F7A
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: String function: 00C8A1AC appears 41 times
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ietabhelper.exe, 00000000.00000002.193861108.0000000000CB3000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamehelper.exe@ vs ietabhelper.exe
Source: ietabhelper.exeBinary or memory string: OriginalFilenamehelper.exe@ vs ietabhelper.exe
Source: classification engineClassification label: clean6.winEXE@1/3@0/0
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C55320 CoCreateInstance,CoCreateInstance,lstrlenW,CLSIDFromString,CLSIDFromProgID,SysStringLen,CoGetClassObject,CoCreateInstance,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C81890 GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,
Source: C:\Users\user\Desktop\ietabhelper.exeFile created: C:\Users\user\AppData\Local\IE TabJump to behavior
Source: ietabhelper.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ietabhelper.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\ietabhelper.exeFile read: C:\Users\user\Desktop\ietabhelper.exeJump to behavior
Source: C:\Users\user\Desktop\ietabhelper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: ietabhelper.exeStatic PE information: certificate valid
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ietabhelper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Don\Documents\src\ietabmoney\helper\Release\ietabhelper.pdb source: ietabhelper.exe
Source: ietabhelper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ietabhelper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ietabhelper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ietabhelper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ietabhelper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C51070 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C8A1F1 push ecx; ret
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C9D8C3 push ss; retf
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C85A46 push ecx; ret
Source: C:\Users\user\Desktop\ietabhelper.exeFile created: C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exeJump to dropped file
Source: C:\Users\user\Desktop\ietabhelper.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\ietabhelper.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\ietabhelper.exeAPI coverage: 9.4 %
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C79B10 lstrlenA,MultiByteToWideChar,FindFirstFileExW,lstrlenW,WideCharToMultiByte,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C797B0 FindFirstFileExW,FindClose,FindNextFileW,FindNextFileW,FindNextFileW,FindClose,DeleteFileW,RemoveDirectoryW,FindClose,
Source: C:\Users\user\Desktop\ietabhelper.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C83677 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C51070 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C83296 GetProcessHeap,HeapAlloc,RtlInterlockedPopEntrySList,VirtualAlloc,RtlInterlockedPopEntrySList,VirtualFree,RtlInterlockedPushEntrySList,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C82348 _abort,__NMSG_WRITE,_raise,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C91070 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C83677 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C83EAE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C85F3E __NMSG_WRITE,_raise,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C91652 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Source: C:\Users\user\Desktop\ietabhelper.exeCode function: 0_2_00C6F490 GetVersionExW,ReadFile,WaitForSingleObject,ReadFile,PostMessageW,ReadFile,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API2Path InterceptionPath InterceptionMasquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery13Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 335603 Sample: ietabhelper.exe Startdate: 03/01/2021 Architecture: WINDOWS Score: 6 4 ietabhelper.exe 2 11 2->4         started        file3 7 C:\Users\user\AppData\...\ietabhelper.exe, PE32 4->7 dropped

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
ietabhelper.exe0%VirustotalBrowse
ietabhelper.exe0%MetadefenderBrowse
ietabhelper.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exe0%MetadefenderBrowse
C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.godaddy.com/gdroot-g2.crl0Fietabhelper.exefalse
    high
    http://certificates.godaddy.com/repository/0vietabhelper.exefalse
      high
      https://certs.godaddy.com/repository/0ietabhelper.exefalse
        high
        http://crl.godaddy.com/gdig2s5-0.crl0Sietabhelper.exefalse
          high
          http://crl.thawte.com/ThawteTimestampingCA.crl0ietabhelper.exefalse
            high
            http://certificates.godaddy.com/repository/gdig2.crt0ietabhelper.exefalse
              high
              http://ocsp.thawte.com0ietabhelper.exefalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://certs.godaddy.com/repository/1301ietabhelper.exefalse
                high
                http://crl.godaddy.com/gdroot.crl0Fietabhelper.exefalse
                  high
                  No contacted IP infos

                  General Information

                  Joe Sandbox Version:31.0.0 Red Diamond
                  Analysis ID:335603
                  Start date:03.01.2021
                  Start time:14:27:12
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 2m 55s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:ietabhelper.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:1
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean6.winEXE@1/3@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 68.6% (good quality ratio 66.7%)
                  • Quality average: 75.7%
                  • Quality standard deviation: 28.7%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exe
                  Process:C:\Users\user\Desktop\ietabhelper.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):473640
                  Entropy (8bit):6.386028286604459
                  Encrypted:false
                  SSDEEP:6144:3gNxZ22UPhGZsfee1ltHX94T0vL7MLBGNalMQEgUYVUd3GpCV:3gN/IPh4o7ltHt44vHMLBUOMQEgUYo
                  MD5:BC63E7F22CD5CE2EBD6F114348073623
                  SHA1:665A18811DC981C1EE5B0258823216AAB40CC2F8
                  SHA-256:0E28906292348CBE1F6AD70AA943ED4C71615FBBCCF702123639C535E26DD98B
                  SHA-512:D5C8123F88999E20B20ACCABC283538B2616A65D9EB4A15B5F2B5BA4B5219F59CC8966CAF2745AF18DE2AB08623EB2CAC54CD5E422ECC25D0F2B2BFAAB4D9CB1
                  Malicious:false
                  Antivirus:
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............K..K..K..fK...K..wK...K..pKx..K.s.K..K.s.K...K..K..K..yK..K..gK..K..bK..KRich..K........PE..L...,Z.W.....................N.......U............@..........................`......e.....@.................................h........0..................(........D..p...............................H<..@............................................text............................... ..`.rdata..............................@..@.data....X.......8..................@....rsrc........0......................@..@.reloc...X.......Z..................@..B................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\IE Tab\9.4.7.1\ietabhelper.exe:Zone.Identifier
                  Process:C:\Users\user\Desktop\ietabhelper.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview: [ZoneTransfer]....ZoneId=0
                  C:\Users\user\AppData\Local\IE Tab\ietab_nm_manifest.json
                  Process:C:\Users\user\Desktop\ietabhelper.exe
                  File Type:ASCII text
                  Category:modified
                  Size (bytes):367
                  Entropy (8bit):5.052356865698435
                  Encrypted:false
                  SSDEEP:6:u9/zVsLNk/dKtA7YWD0ckDzM2sLgizLYyl5nnG4juVdCEc7U1RFtIl:gptd2A77QE27izLYynG4jNEkU1Rkl
                  MD5:8DB581D6156D65040004C11972C9889F
                  SHA1:378CDF28BC72B1498BCED242317D090BE62FA31E
                  SHA-256:34E795C17747EA61144EF322CDBDF74C5D675DDA47FF0F09AB79CC6983E7CBD1
                  SHA-512:29AEC53D857887E44FD456A36FB5FDD20AB9B61B3D31FA679C52226459D8EB06FA3359B77D413380A98D40FD97E65712BEDDBD83A31D6F76F21AC6E8C0B1460C
                  Malicious:false
                  Reputation:low
                  Preview: {.."name": "net.ietab.ietabhelper.peruser",.."description": "IE Tab Helper",.."path": "C:\\Users\\user\\AppData\\Local\\IE Tab\\9.4.7.1\\ietabhelper.exe",.."type": "stdio",.."allowed_origins": [ "chrome-extension://bjndombghfcohmonofdcfnhjldidnmhd/", "chrome-extension://knnoopddfdgdabjanjmeodpkmlhapkkl/", "chrome-extension://hehijbfgiekmjfkfjpbkbammjbdenadd/" ].}.

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.386028286604459
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:ietabhelper.exe
                  File size:473640
                  MD5:bc63e7f22cd5ce2ebd6f114348073623
                  SHA1:665a18811dc981c1ee5b0258823216aab40cc2f8
                  SHA256:0e28906292348cbe1f6ad70aa943ed4c71615fbbccf702123639c535e26dd98b
                  SHA512:d5c8123f88999e20b20accabc283538b2616a65d9eb4a15b5f2b5ba4b5219f59cc8966caf2745af18de2ab08623eb2cac54cd5e422ecc25d0f2b2bfaab4d9cb1
                  SSDEEP:6144:3gNxZ22UPhGZsfee1ltHX94T0vL7MLBGNalMQEgUYVUd3GpCV:3gN/IPh4o7ltHt44vHMLBUOMQEgUYo
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............K...K...K..fK...K..wK...K..pKx..K.s.K...K.s.K...K...K...K..yK...K..gK...K..bK...KRich...K........PE..L...,Z.W...........

                  File Icon

                  Icon Hash:9a8a808292808000

                  General

                  Entrypoint:0x435515
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
                  Time Stamp:0x57065A2C [Thu Apr 7 13:01:32 2016 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:364d297a275ff6f0532b55340f33f1af
                  Signature Valid:true
                  Signature Issuer:CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
                  Signature Validation Error:The operation completed successfully
                  Error Number:0
                  Not Before, Not After
                  • 3/24/2015 7:55:40 AM 4/18/2017 2:26:21 PM
                  Subject Chain
                  • CN=Blackfish Software, O=Blackfish Software, L=Redmond, S=Washington, C=US
                  Version:3
                  Thumbprint MD5:E47609FFDE97688A9E91C25C5EE03FD1
                  Thumbprint SHA-1:A3BC301D730596175D9E829924D3C8A7C1319631
                  Thumbprint SHA-256:D57846316CB3280780EA12053E44D7BC0EF54C0FE240622D00AB28EDB1CA2BA5
                  Serial:00AF78B0B4986BBDAF
                  Instruction
                  call 00007F2BB435F22Dh
                  jmp 00007F2BB4352F6Eh
                  int3
                  mov ecx, dword ptr [esp+04h]
                  test ecx, 00000003h
                  je 00007F2BB4353116h
                  mov al, byte ptr [ecx]
                  add ecx, 01h
                  test al, al
                  je 00007F2BB4353140h
                  test ecx, 00000003h
                  jne 00007F2BB43530E1h
                  add eax, 00000000h
                  lea esp, dword ptr [esp+00000000h]
                  lea esp, dword ptr [esp+00000000h]
                  mov eax, dword ptr [ecx]
                  mov edx, 7EFEFEFFh
                  add edx, eax
                  xor eax, FFFFFFFFh
                  xor eax, edx
                  add ecx, 04h
                  test eax, 81010100h
                  je 00007F2BB43530DAh
                  mov eax, dword ptr [ecx-04h]
                  test al, al
                  je 00007F2BB4353124h
                  test ah, ah
                  je 00007F2BB4353116h
                  test eax, 00FF0000h
                  je 00007F2BB4353105h
                  test eax, FF000000h
                  je 00007F2BB43530F4h
                  jmp 00007F2BB43530BFh
                  lea eax, dword ptr [ecx-01h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-02h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-03h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-04h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 20h
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  push edi
                  push 00000008h
                  pop ecx
                  mov esi, 0044E6C4h
                  lea edi, dword ptr [ebp-20h]
                  rep movsd
                  mov dword ptr [ebp-08h], eax
                  mov eax, dword ptr [ebp+0Ch]
                  pop edi
                  mov dword ptr [ebp-04h], eax
                  pop esi
                  test eax, eax
                  je 00007F2BB43530FEh
                  test byte ptr [eax], 00000008h
                  je 00007F2BB43530F9h
                  mov dword ptr [ebp-0Ch], 00000000h
                  Programming Language:
                  • [ASM] VS2008 SP1 build 30729
                  • [ C ] VS2008 SP1 build 30729
                  • [ C ] VS2005 build 50727
                  • [IMP] VS2005 build 50727
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 SP1 build 30729
                  • [C++] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5b6680xdc.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000xcef4.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x71e000x1c28.reloc
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000x4400.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x4e4700x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x53c480x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x4e0000x3f4.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x4cad40x4cc00False0.525381082044data6.58462013635IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x4e0000xeb860xec00False0.346398305085data4.70355148199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x5d0000x58dc0x3800False0.24755859375data4.40837579619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x630000xcef40xd000False0.146709735577data4.37678378488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x700000x58c40x5a00False0.538671875data5.661331641IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  FILE0x635fc0xa1ASCII textEnglishUnited States
                  TYPELIB0x636a00xa28dataEnglishUnited States
                  RT_ICON0x640c80x2e8dataEnglishUnited States
                  RT_ICON0x643b00x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x644d80xea8dataEnglishUnited States
                  RT_ICON0x653800x8a8dataEnglishUnited States
                  RT_ICON0x65c280x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x661900x25a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
                  RT_ICON0x687380x10a8dataEnglishUnited States
                  RT_ICON0x697e00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x69c480x2e8dataEnglishUnited States
                  RT_ICON0x69f300x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x6a0580xea8dataEnglishUnited States
                  RT_ICON0x6af000x8a8dataEnglishUnited States
                  RT_ICON0x6b7a80x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x6bd100x25a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
                  RT_ICON0x6e2b80x10a8dataEnglishUnited States
                  RT_ICON0x6f3600x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_MENU0x6f7c80x4adataEnglishUnited States
                  RT_DIALOG0x6f8140x12cdataEnglishUnited States
                  RT_STRING0x6f9400x38dataEnglishUnited States
                  RT_ACCELERATOR0x6f9780x10dataEnglishUnited States
                  RT_GROUP_ICON0x6f9880x76dataEnglishUnited States
                  RT_GROUP_ICON0x6fa000x76dataEnglishUnited States
                  RT_VERSION0x6fa780x320dataEnglishUnited States
                  RT_MANIFEST0x6fd980x15aASCII text, with CRLF line terminatorsEnglishUnited States
                  DLLImport
                  KERNEL32.dllGetModuleHandleW, lstrcmpiW, SizeofResource, LoadResource, FindResourceW, LoadLibraryExW, CreateThread, GetModuleHandleA, OpenProcess, CloseHandle, GetCurrentProcessId, GetStdHandle, SetStdHandle, WideCharToMultiByte, CreateEventW, lstrlenA, WriteFile, FlushFileBuffers, SetEvent, PeekNamedPipe, WaitForSingleObject, ReadFile, GetVersionExW, CreateFileW, CopyFileW, FindFirstFileExW, FindNextFileW, FindClose, DeleteFileW, RemoveDirectoryW, LockResource, GetTempFileNameW, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, GetLocaleInfoW, GetConsoleMode, GetConsoleCP, SetFilePointer, IsValidLocale, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, lstrcmpW, GetStringTypeA, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetStartupInfoA, GetFileType, SetHandleCount, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, InitializeCriticalSectionAndSpinCount, IsValidCodePage, GetOEMCP, GetACP, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetModuleFileNameA, HeapCreate, CompareStringW, GetStringTypeW, LCMapStringW, LCMapStringA, GetCPInfo, RtlUnwind, GetStartupInfoW, ExitProcess, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, HeapSize, HeapReAlloc, HeapDestroy, VirtualAlloc, VirtualFree, IsProcessorFeaturePresent, LoadLibraryA, HeapAlloc, GetProcessHeap, HeapFree, Sleep, InterlockedExchange, InterlockedCompareExchange, SetLastError, RaiseException, InitializeCriticalSection, DeleteCriticalSection, InterlockedIncrement, InterlockedDecrement, LeaveCriticalSection, EnterCriticalSection, MultiByteToWideChar, GetTickCount, GetModuleFileNameW, LoadLibraryW, GetFileAttributesW, GlobalFree, GetCurrentThreadId, FlushInstructionCache, GetCurrentProcess, GetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrlenW, FreeLibrary, GetProcAddress
                  USER32.dllInvalidateRect, BeginPaint, GetClientRect, SetFocus, IsWindow, GetFocus, IsChild, DestroyWindow, ReleaseDC, EqualRect, SetWindowPos, GetParent, GetWindowPlacement, SetWindowLongA, SetParent, LoadStringW, LoadAcceleratorsW, GetMessageW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, UpdateWindow, GetDC, EndPaint, SetWindowLongW, GetWindowLongW, DefWindowProcW, CallWindowProcW, SetWindowsHookExW, UnhookWindowsHookEx, CallNextHookEx, FindWindowExW, MessageBoxW, GetForegroundWindow, KillTimer, AnimateWindow, ShowWindow, IsWindowVisible, GetKeyState, PostQuitMessage, GetAncestor, GetWindowThreadProcessId, SetTimer, DialogBoxParamW, EndDialog, LoadMenuW, RegisterWindowMessageW, GetWindowTextLengthW, GetWindowTextW, SetWindowTextW, GetWindow, GetDlgItem, GetClassNameW, GetSysColor, CharNextW, RedrawWindow, LoadCursorW, GetClassInfoExW, RegisterClassExW, CreateAcceleratorTableW, ScreenToClient, SetCapture, ReleaseCapture, FillRect, InvalidateRgn, GetDesktopWindow, DestroyAcceleratorTable, CreateWindowExW, SendMessageW, PostMessageW, MoveWindow, ClientToScreen, GetWindowRect, UnregisterClassA
                  GDI32.dllGetStockObject, DeleteDC, BitBlt, DeleteObject, SelectObject, CreateCompatibleBitmap, CreateCompatibleDC, CreateSolidBrush, GetTextExtentPoint32W, CreateFontIndirectW, GetPixel, GetObjectW, GetDeviceCaps
                  ADVAPI32.dllRegCloseKey, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegDeleteValueW, RegCreateKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegDeleteKeyW, RegSetValueExW, RegOpenKeyExW
                  SHELL32.dllSHCreateDirectoryExW, SHGetFolderPathW, ShellExecuteExW
                  ole32.dllCreateStreamOnHGlobal, CoTaskMemFree, CoTaskMemRealloc, OleInitialize, OleUninitialize, CLSIDFromString, CLSIDFromProgID, CoGetClassObject, CoCreateInstance, OleLockRunning, StringFromGUID2, CoTaskMemAlloc
                  OLEAUT32.dllVarUI4FromStr, DispCallFunc, SysAllocStringLen, OleCreateFontIndirect, LoadTypeLib, LoadRegTypeLib, SysStringLen, SysAllocString, SysFreeString, VariantClear, VariantInit
                  dbghelp.dllMiniDumpWriteDump
                  WININET.dllInternetSetCookieExW, InternetCrackUrlW
                  urlmon.dllURLDownloadToCacheFileW, CreateURLMoniker
                  DescriptionData
                  LegalCopyrightCopyright 2014 Blackfish Software
                  InternalNameietabhelper.exe
                  FileVersion9, 4, 7, 1
                  CompanyNameBlackfish Software
                  ProductNameietabhelper.exe
                  ProductVersion9, 4, 7, 1
                  FileDescriptionIE Tab Helper application
                  OriginalFilenamehelper.exe
                  Translation0x0409 0x04b0
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  No network behavior found

                  Code Manipulations

                  Statistics

                  System Behavior

                  Start time:14:27:54
                  Start date:03/01/2021
                  Path:C:\Users\user\Desktop\ietabhelper.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\ietabhelper.exe'
                  Imagebase:0xc50000
                  File size:473640 bytes
                  MD5 hash:BC63E7F22CD5CE2EBD6F114348073623
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Disassembly

                  Code Analysis