Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe
Resource
win10v2004-20250313-en
General
-
Target
a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe
-
Size
54KB
-
MD5
4c4bd8320b656966d01874d3f8f89500
-
SHA1
6dcd7370f2d380f55b657bdd6ae5685a2c3bdb48
-
SHA256
a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1
-
SHA512
cef0daa529ece6a062fd75004949e4c03de2690909033c5a1d09b11618c60f8cbe82595b1ec292c7853cf47a4b1a0e164d391dae17a90278948b4ea9be87fe69
-
SSDEEP
1536:e6q10k0EFjed6rqJ+6v8tvGE9UHrSdghj8bvHRIkhbUIchUh80mhDhNIhH+hjhUY:E1oEFlt6v8tvGE9UHrSdghj8bvHRIkhI
Malware Config
Extracted
blihanstealer
pomdfghrt
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
BlihanStealer
Blihan is a stealer written in C++.
-
Blihanstealer family
-
Deletes itself 1 IoCs
pid Process 2720 microsofthelp.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 microsofthelp.exe 1812 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5132 wrote to memory of 2720 5132 a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe 86 PID 5132 wrote to memory of 2720 5132 a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe 86 PID 5132 wrote to memory of 2720 5132 a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe 86 PID 4444 wrote to memory of 1812 4444 cmd.exe 88 PID 4444 wrote to memory of 1812 4444 cmd.exe 88 PID 4444 wrote to memory of 1812 4444 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe"C:\Users\Admin\AppData\Local\Temp\a63a8b2cc66e20ceee31abc51cf4e4521c59a8b8e7f2b2b246741c0b69bae7a1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5132 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\microsofthelp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\microsofthelp.exeC:\Windows\microsofthelp.exe2⤵
- Executes dropped EXE
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5abc4589b1a71e7d8936eb656447ac10d
SHA1fc7e1b7f34ecbf4cb3aa97e8f8346beb2014fecc
SHA256e1b94bc11427af75109e8671b607ce8bada72a1d726adce1579d7593f2a4c27c
SHA512268273e869bfa6c7a5adeeda0916dbbfead58c235a6c56c8fb9417b496777a02e3fcbc1647b1023da8a542a351f8695a72780b22791cbdeaadb262c1357543ba