Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2025, 17:16

General

  • Target

    1d36fb0f7e8726105fa8b177b977679c88a2640d2fdbf7e5182493e0958ab18b.exe

  • Size

    96KB

  • MD5

    c695938c1063ccc2dfc278d9db8a6c85

  • SHA1

    abe5c473962c3676e2518c6225aa1e5edf3e67a9

  • SHA256

    1d36fb0f7e8726105fa8b177b977679c88a2640d2fdbf7e5182493e0958ab18b

  • SHA512

    4f2fcda1274982d21c7f4c3551a0fcb41cf74df1aef5fbdbed92b843b063ad89b4ebd8e00b6029db33f75ef2f55830dbb3ced3d28cb052ec9d3a43b22c2678db

  • SSDEEP

    3072:NAoglOwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAcBHUIF2kvEHrH1hyhuhrh1hKr:eenk

Malware Config

Extracted

Family

blihanstealer

Mutex

pomdfghrt

Attributes
  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

Signatures

  • BlihanStealer

    Blihan is a stealer written in C++.

  • Blihanstealer family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d36fb0f7e8726105fa8b177b977679c88a2640d2fdbf7e5182493e0958ab18b.exe
    "C:\Users\Admin\AppData\Local\Temp\1d36fb0f7e8726105fa8b177b977679c88a2640d2fdbf7e5182493e0958ab18b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    96KB

    MD5

    95f401dd411ac4b116c05678af985fe9

    SHA1

    7c482e913d8d22a1c257ebf6da18e34ffbd2c2f5

    SHA256

    b34686b00c2e09a4478138c466f88de3d76560ab7c04c86b39dfce4e2c0c5036

    SHA512

    712400e9b95e5ac8f394a313357055688d35f788c7025daa4910764f9047321122c1a14e1bbc5010ed4dd6f988ea92e6ba98204cc3ac1947ddb67225a40fa387

  • memory/2084-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2084-7-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2772-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2772-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB