Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe
Resource
win10v2004-20250314-en
General
-
Target
73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe
-
Size
73KB
-
MD5
b13eb4670f5ffd81489152cdf1124a5f
-
SHA1
e86079c9e4370424bdbb1e8fddaaf21ba747a541
-
SHA256
73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103
-
SHA512
286e4885a2f318c085c55f36da6513975b8dd0163742f23becc8aef4c13715360838d24f119a37476c58e5b7486f8a044c9243377787146fea8fe15de79a9431
-
SSDEEP
1536:e6q10k0EFjed6rqJ+6vghzwYu7vih9GueIh9j2IoHAcBHUIF2kvEHrH1hyhuhrhV:E1oEFlt6vghzwYu7vih9GueIh9j2IoHa
Malware Config
Extracted
blihanstealer
pomdfghrt
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
BlihanStealer
Blihan is a stealer written in C++.
-
Blihanstealer family
-
Deletes itself 1 IoCs
pid Process 4716 microsofthelp.exe -
Executes dropped EXE 2 IoCs
pid Process 4716 microsofthelp.exe 2284 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 452 wrote to memory of 4716 452 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe 87 PID 452 wrote to memory of 4716 452 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe 87 PID 452 wrote to memory of 4716 452 73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe 87 PID 5092 wrote to memory of 2284 5092 cmd.exe 89 PID 5092 wrote to memory of 2284 5092 cmd.exe 89 PID 5092 wrote to memory of 2284 5092 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe"C:\Users\Admin\AppData\Local\Temp\73c77f52a572a363bdeff5d4ecaffd7aad05afd709b62165deb5d4544794c103.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\microsofthelp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\microsofthelp.exeC:\Windows\microsofthelp.exe2⤵
- Executes dropped EXE
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD50bccc08dac8b14838f266d8914b4022d
SHA1a8fa6dcc964403ba4f4db07dca40bca478f4e622
SHA256fad421d31046b25c0e9db0a35aba0dc6347f7e8ba4e67549c782a17391a40c80
SHA51276a1ce1b0e66731e70d0ef938ee2b7ea4dbd6f812f41b65d2e7b39b266ac4f5342bababea5505c5ab8a36d93b3501c5e6a3860b9166c0e519d500fdf85875671