Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
bluemaintenance`/bluemaintenance`.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bluemaintenance`/bluemaintenance`.exe
Resource
win10v2004-20241007-en
General
-
Target
bluemaintenance`/bluemaintenance`.exe
-
Size
1.2MB
-
MD5
a5cd8b932faf92e4b803614f86bec0b7
-
SHA1
ce444152b967a2bd67a32671424d7b6ed87d1025
-
SHA256
86304b458edfacda0d8b640b232c17bf69647cca2596a91416f202f66b9e6cbd
-
SHA512
956d9674a7a262de61ab5836f70d7a623f005fb8cba50296dbdb1ff70045f0b90a410107a697190de029ff6828680d95529191eb20a050617270c2789b2c7542
-
SSDEEP
24576:1G07HUw9ZbnJFx+Dp2micGd+AEPFmPquiOIe:1G0wM+Ami1dZAFmP9I
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 3200 1956 bluemaintenance`.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bluemaintenance`.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1956 bluemaintenance`.exe 1956 bluemaintenance`.exe 1956 bluemaintenance`.exe 1956 bluemaintenance`.exe 1956 bluemaintenance`.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe 3200 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 bluemaintenance`.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 1688 1956 bluemaintenance`.exe 102 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103 PID 1956 wrote to memory of 3200 1956 bluemaintenance`.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bluemaintenance`\bluemaintenance`.exe"C:\Users\Admin\AppData\Local\Temp\bluemaintenance`\bluemaintenance`.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-