Windows Analysis Report
5ZjBJd69zi.exe

Overview

General Information

Sample name: 5ZjBJd69zi.exe
renamed because original name is a hash value
Original sample name: 167508c26c39acd68d3ea5229bfde9baeb769002.exe
Analysis ID: 1546800
MD5: f8fe4a90e412f083ba00e5a82aaacd75
SHA1: 167508c26c39acd68d3ea5229bfde9baeb769002
SHA256: acbc0c7b6c149dc9400eaaa19991877ac86b9c3e2d6d54294fc519ad611ea981
Tags: exeReversingLabsuser-NDA0E
Infos:

Detection

Blihan Stealer
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Blihan Stealer
Creates an autostart registry key pointing to binary in C:\Windows
Deletes itself after installation
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality to dynamically determine API calls
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
PE file contains sections with non-standard names
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: 5ZjBJd69zi.exe Avira: detected
Source: C:\Windows\microsofthelp.exe Avira: detection malicious, Label: TR/Downloader.Gen
Source: 5ZjBJd69zi.exe ReversingLabs: Detection: 92%
Source: C:\Windows\microsofthelp.exe Joe Sandbox ML: detected
Source: 5ZjBJd69zi.exe Joe Sandbox ML: detected
Source: 5ZjBJd69zi.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00401C80 FindFirstFileA,FindClose, 0_2_00401C80
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.12:49710
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.12:49717
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_004017C0 HeapFree,InternetOpenA,InternetSetOptionExA,InternetOpenUrlA,GetProcessHeap,InternetReadFile,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlReAllocateHeap,InternetReadFile,InternetCloseHandle,InternetCloseHandle, 0_2_004017C0

System Summary

barindex
Source: 5ZjBJd69zi.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: microsofthelp.exe.0.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe File created: C:\Windows\microsofthelp.exe Jump to behavior
Source: C:\Windows\microsofthelp.exe File created: C:\Windows\HidePlugin.dll Jump to behavior
Source: 5ZjBJd69zi.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engine Classification label: mal100.troj.evad.winEXE@3/1@0/0
Source: C:\Windows\microsofthelp.exe Mutant created: \Sessions\1\BaseNamedObjects\pomdfghrt
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 5ZjBJd69zi.exe ReversingLabs: Detection: 92%
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe File read: C:\Users\user\Desktop\5ZjBJd69zi.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\5ZjBJd69zi.exe "C:\Users\user\Desktop\5ZjBJd69zi.exe"
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Process created: C:\Windows\microsofthelp.exe "C:\Windows\microsofthelp.exe"
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Process created: C:\Windows\microsofthelp.exe "C:\Windows\microsofthelp.exe" Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\microsofthelp.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\microsofthelp.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\microsofthelp.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00401510 lstrcat,LoadLibraryA,GetProcAddress, 0_2_00401510
Source: 5ZjBJd69zi.exe Static PE information: section name: .shoooo
Source: 5ZjBJd69zi.exe Static PE information: section name: .imports
Source: microsofthelp.exe.0.dr Static PE information: section name: .shoooo
Source: microsofthelp.exe.0.dr Static PE information: section name: .imports
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_004041C0 push eax; ret 0_2_004041EE
Source: 5ZjBJd69zi.exe Static PE information: section name: .shoooo entropy: 7.835447843663171
Source: microsofthelp.exe.0.dr Static PE information: section name: .shoooo entropy: 7.835447843663171

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Executable created and started: C:\Windows\microsofthelp.exe Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe File created: C:\Windows\microsofthelp.exe Jump to dropped file
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe File created: C:\Windows\microsofthelp.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelp Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelp Jump to behavior
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelp Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\microsofthelp.exe File deleted: c:\users\user\desktop\5zjbjd69zi.exe Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Evasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: GetProcessHeap,GetAdaptersInfo,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetAdaptersInfo,GetProcessHeap,HeapFree, 0_2_00401CC0
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Evasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00401C80 FindFirstFileA,FindClose, 0_2_00401C80
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00401510 lstrcat,LoadLibraryA,GetProcAddress, 0_2_00401510
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00401000 EntryPoint,GetModuleFileNameA,Sleep,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetWindowsDirectoryA,lstrcat,lstrcmpiA,ExitProcess,Sleep,DeleteFileA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,Sleep,CreateThread,wsprintfA,Sleep,WaitForSingleObject, 0_2_00401000
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00402D5E SetUnhandledExceptionFilter, 0_2_00402D5E
Source: C:\Users\user\Desktop\5ZjBJd69zi.exe Code function: 0_2_00402D70 SetUnhandledExceptionFilter, 0_2_00402D70

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5ZjBJd69zi.exe, type: SAMPLE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.4af438.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.4af438.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.0.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 5ZjBJd69zi.exe PID: 7092, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: microsofthelp.exe PID: 7108, type: MEMORYSTR
Source: Yara match File source: C:\Windows\microsofthelp.exe, type: DROPPED

Remote Access Functionality

barindex
Source: Yara match File source: 5ZjBJd69zi.exe, type: SAMPLE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.4af438.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.4af438.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.0.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.0.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 5ZjBJd69zi.exe PID: 7092, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: microsofthelp.exe PID: 7108, type: MEMORYSTR
Source: Yara match File source: C:\Windows\microsofthelp.exe, type: DROPPED
No contacted IP infos