Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 00:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe
Resource
win10v2004-20250314-en
General
-
Target
e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe
-
Size
71KB
-
MD5
1712579bbf8f1918816a8934f2282c8d
-
SHA1
0ee95c429e1ea88431cb7d65fe469a5817a9528e
-
SHA256
e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff
-
SHA512
40a36152483da9d1159a9e3951827ac869361b4b504ea44fa203008339556d1b7457e33b6952ea62ed4e2663ec6c32acce961f825b3d9df9614ed72ec4ed756e
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIj:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVF
Malware Config
Signatures
-
BlihanStealer
Blihan is a stealer written in C++.
-
Blihanstealer family
-
Deletes itself 1 IoCs
pid Process 2100 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2100 2264 e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe 30 PID 2264 wrote to memory of 2100 2264 e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe 30 PID 2264 wrote to memory of 2100 2264 e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe 30 PID 2264 wrote to memory of 2100 2264 e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe"C:\Users\Admin\AppData\Local\Temp\e96c39e2e39407695c120a317ff6a7eb159041989ab1a1e6d689ce1f23860cff.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD55a95205fbf657a9979ce536c25257191
SHA113c229affd9ca51c824f163536bb3fe569fbc0e9
SHA256ae7349ee4c88bc11316f56c238872adb73f937c08710e6185e1f82e834098a93
SHA51200f0e0c4dbca6491cd921c063249aa7c6982e4835b11ad171d97f390b7eeef261b91e83168d1ee63091e189edb0f4e53d5264e97dc921040f50f9d8ea47f150f