Analysis
-
max time kernel
90s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
bluestacks-app-player-4-240-0-1075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bluestacks-app-player-4-240-0-1075.exe
Resource
win10v2004-20221111-en
General
-
Target
bluestacks-app-player-4-240-0-1075.exe
-
Size
1.1MB
-
MD5
cd65f57a6786232a03289b7f15fe189f
-
SHA1
221823fdaabbd8d2783b5df554fe59380cecfa11
-
SHA256
75e176788275283daf177498a6b4d99ec58b5616475df460c3282ce30713f27f
-
SHA512
35ba7c1f61c3b9033cd8e79a07b85371d2086910620f7445cf7ae3dfa6554b9b5972e8f807922f7913eabdf954cf7b013f102790e65e2bcf871d24a132dd545a
-
SSDEEP
24576:1cVkKS/WtWrnngnnnKnanxNp2bp2h9YEO18SRvL0J2OYDWR0Pze:1cB6WErnngnnnKnanzY9y9o840JDL
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\7zS05347836\Locales\i18n.en-US.txt
https://bluestacks.com
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation bluestacks-app-player-4-240-0-1075.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation BlueStacksInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation BlueStacksInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation bluestacks-app-player-4-240-0-1075.exe -
Executes dropped EXE 3 IoCs
pid Process 2696 BlueStacksInstaller.exe 3740 BlueStacksInstaller.exe 1352 BlueStacksInstaller.exe -
Loads dropped DLL 3 IoCs
pid Process 2696 BlueStacksInstaller.exe 3740 BlueStacksInstaller.exe 1352 BlueStacksInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 2696 BlueStacksInstaller.exe 3740 BlueStacksInstaller.exe 3740 BlueStacksInstaller.exe 1352 BlueStacksInstaller.exe 1352 BlueStacksInstaller.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3740 BlueStacksInstaller.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2696 BlueStacksInstaller.exe Token: SeDebugPrivilege 3740 BlueStacksInstaller.exe Token: SeDebugPrivilege 1352 BlueStacksInstaller.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2696 4944 bluestacks-app-player-4-240-0-1075.exe 80 PID 4944 wrote to memory of 2696 4944 bluestacks-app-player-4-240-0-1075.exe 80 PID 2696 wrote to memory of 3740 2696 BlueStacksInstaller.exe 82 PID 2696 wrote to memory of 3740 2696 BlueStacksInstaller.exe 82 PID 3740 wrote to memory of 3924 3740 BlueStacksInstaller.exe 90 PID 3740 wrote to memory of 3924 3740 BlueStacksInstaller.exe 90 PID 3740 wrote to memory of 3924 3740 BlueStacksInstaller.exe 90 PID 3924 wrote to memory of 1352 3924 bluestacks-app-player-4-240-0-1075.exe 91 PID 3924 wrote to memory of 1352 3924 bluestacks-app-player-4-240-0-1075.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bluestacks-app-player-4-240-0-1075.exe"C:\Users\Admin\AppData\Local\Temp\bluestacks-app-player-4-240-0-1075.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\7zS05347836\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS05347836\BlueStacksInstaller.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\7zS05347836\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS05347836\BlueStacksInstaller.exe" "install" "bluestacks-app-player-4-240-0-1075.exe" "null" "admin" "9141d081-a6e9-4553-921a-735396ee4d8c" "45595e1c-cff6-4947-9b87-01a6763b21d8"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\BlueStacksSetup\bluestacks-app-player-4-240-0-1075.exe"C:\Users\Admin\AppData\Local\BlueStacksSetup\bluestacks-app-player-4-240-0-1075.exe" -versionMachineID=45595e1c-cff6-4947-9b87-01a6763b21d8 -machineID=9141d081-a6e9-4553-921a-735396ee4d8c -pddir="C:\ProgramData\BlueStacks"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\7zS45FC6496\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS45FC6496\BlueStacksInstaller.exe" -versionMachineID=45595e1c-cff6-4947-9b87-01a6763b21d8 -machineID=9141d081-a6e9-4553-921a-735396ee4d8c -pddir="C:\ProgramData\BlueStacks"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b45cf7e15fc94b0bf98743ce670e4afc
SHA1a6420d64b34734a87d691fb1f4335efcaece61da
SHA2569c6b7cd4f1682a32428e2ca6fc489a8a0040dd7cc1e044e204754faf56d770ad
SHA5127bafa3bb2464dce1f7a68ee5d92d3b57db5040a2316dd4d1dd3c999164a436a6415ecaafa57e9c9f478b4131eccbf5e8baaa2269366796d497e5b907d1601603
-
Filesize
5KB
MD5b01430303dd96e7f33a4752c0c547bd6
SHA12cdc49580496775d64dae2a216ab188e4d0ca8f3
SHA25667ab41a8f5f4ed82bae15efce5fd1b50f4947aecd1c04ba315f0b94476608151
SHA512901cdbc4d952b23d6f307d1599b41dca5aa51abe2660de9db76ed3cdcd2d26e7f9780421f8fc033360f470dc11c830a23ff8c728965e18d6e5175c2ebe10a5d2
-
Filesize
105B
MD5c4ab3e9ae363b080b84db5bc37040dfd
SHA146a4432006280539e381c9a57a0843907fcc074c
SHA256575e063185ac7531372a869a1ed62ae2d62b575a858e237df4737948b13945c9
SHA51239b9b1d34007b793e012a2b1025f0e99c93fa236033f731c2eb4caaf2a1faed1e7b19447c204107bf3f21fb2387ca92592395b6af4d6a76961cf79d3abc2ac44
-
Filesize
309B
MD57d05a608ee68ea6525912452d91f59ce
SHA114bcfeb38d10c79840f8028d2e7d2a26e76b2cc6
SHA256ab884796da2b6b57c7b22e5623d3c280fc9994353fe25e9bcb2a72362ac40463
SHA512c65cafc92897ceeaa0ed37ab6293bb868951287e9703a1766882a4b09e38564ded3df7ab2d8f7778346cfcc3677c63d73c06bbbe99ecc320b972853cba4694b3
-
Filesize
2KB
MD50f186e94e9b99a5e2e31c2dc955346cc
SHA1ffd9997b2db8c39f410f5d2a9f3d080f8d7523b7
SHA256bf171a0e53a7acb766fd4f462f516bc2bab3dbc6e12b7b2423af5bae8be1fdf4
SHA512530ea4c1e9fd6799cbb1be4f7278d4e9ce23875898164dc42650e62e8b37cd886cfa0174310541736487e58ca691a83b1079aa8780ebb7491de8da65c3433488
-
Filesize
642KB
MD522220d9945694adebe2461df80330015
SHA181a7d67c06a913a22bdfa99e5702afa587f5e532
SHA256ca4c0af30fcd6445d3b4634ed4df24ac3d8e2eccce50fc0d4b45983f80f9b98f
SHA5122d240c42d88699bb3443624a706345dc5d5f9e0ab56ee54ecad82b5d871ff52b4c140e56f7334ddd465595cd64aa974541b878bdd37ab1778a23619d8e5f0f36
-
Filesize
642KB
MD522220d9945694adebe2461df80330015
SHA181a7d67c06a913a22bdfa99e5702afa587f5e532
SHA256ca4c0af30fcd6445d3b4634ed4df24ac3d8e2eccce50fc0d4b45983f80f9b98f
SHA5122d240c42d88699bb3443624a706345dc5d5f9e0ab56ee54ecad82b5d871ff52b4c140e56f7334ddd465595cd64aa974541b878bdd37ab1778a23619d8e5f0f36
-
Filesize
642KB
MD522220d9945694adebe2461df80330015
SHA181a7d67c06a913a22bdfa99e5702afa587f5e532
SHA256ca4c0af30fcd6445d3b4634ed4df24ac3d8e2eccce50fc0d4b45983f80f9b98f
SHA5122d240c42d88699bb3443624a706345dc5d5f9e0ab56ee54ecad82b5d871ff52b4c140e56f7334ddd465595cd64aa974541b878bdd37ab1778a23619d8e5f0f36
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
550KB
MD56a460a2c1bf5fcdad829fbb2c0ce94ed
SHA19773df920340c194ab10d30b41cd8b50e566864c
SHA256ba3e51dc14c1d98e5477b45c0f0a45d2fab180c446b5537e533054c7ce28eba5
SHA512c725ab4fa9bf6888f6da655924543aacce0f1b07f86cdf19f35acf512157324f1d2467a9bdb6e237adb4b3b581788b00e7810feca71af7072dfead69c5f87087
-
Filesize
550KB
MD56a460a2c1bf5fcdad829fbb2c0ce94ed
SHA19773df920340c194ab10d30b41cd8b50e566864c
SHA256ba3e51dc14c1d98e5477b45c0f0a45d2fab180c446b5537e533054c7ce28eba5
SHA512c725ab4fa9bf6888f6da655924543aacce0f1b07f86cdf19f35acf512157324f1d2467a9bdb6e237adb4b3b581788b00e7810feca71af7072dfead69c5f87087
-
Filesize
550KB
MD56a460a2c1bf5fcdad829fbb2c0ce94ed
SHA19773df920340c194ab10d30b41cd8b50e566864c
SHA256ba3e51dc14c1d98e5477b45c0f0a45d2fab180c446b5537e533054c7ce28eba5
SHA512c725ab4fa9bf6888f6da655924543aacce0f1b07f86cdf19f35acf512157324f1d2467a9bdb6e237adb4b3b581788b00e7810feca71af7072dfead69c5f87087
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
114KB
MD5de5c90736dbdb0d8fc21ede2c708d290
SHA1bc2baef7a979f28ff93aac75da888d711fd597a9
SHA2569abc2b3d15d93426144af57d7c9603b21d6da70d523b3ae62695e854fe0240b0
SHA51238da6d0956eed49429ac84bac1212572553abbc3518b5fcff66db21f454b534b8c06ae57005b3f76c4036eccdef0c27b3895aacd3076aeef03c6db180b434c3a
-
Filesize
642KB
MD522220d9945694adebe2461df80330015
SHA181a7d67c06a913a22bdfa99e5702afa587f5e532
SHA256ca4c0af30fcd6445d3b4634ed4df24ac3d8e2eccce50fc0d4b45983f80f9b98f
SHA5122d240c42d88699bb3443624a706345dc5d5f9e0ab56ee54ecad82b5d871ff52b4c140e56f7334ddd465595cd64aa974541b878bdd37ab1778a23619d8e5f0f36
-
Filesize
642KB
MD522220d9945694adebe2461df80330015
SHA181a7d67c06a913a22bdfa99e5702afa587f5e532
SHA256ca4c0af30fcd6445d3b4634ed4df24ac3d8e2eccce50fc0d4b45983f80f9b98f
SHA5122d240c42d88699bb3443624a706345dc5d5f9e0ab56ee54ecad82b5d871ff52b4c140e56f7334ddd465595cd64aa974541b878bdd37ab1778a23619d8e5f0f36
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
550KB
MD56a460a2c1bf5fcdad829fbb2c0ce94ed
SHA19773df920340c194ab10d30b41cd8b50e566864c
SHA256ba3e51dc14c1d98e5477b45c0f0a45d2fab180c446b5537e533054c7ce28eba5
SHA512c725ab4fa9bf6888f6da655924543aacce0f1b07f86cdf19f35acf512157324f1d2467a9bdb6e237adb4b3b581788b00e7810feca71af7072dfead69c5f87087
-
Filesize
550KB
MD56a460a2c1bf5fcdad829fbb2c0ce94ed
SHA19773df920340c194ab10d30b41cd8b50e566864c
SHA256ba3e51dc14c1d98e5477b45c0f0a45d2fab180c446b5537e533054c7ce28eba5
SHA512c725ab4fa9bf6888f6da655924543aacce0f1b07f86cdf19f35acf512157324f1d2467a9bdb6e237adb4b3b581788b00e7810feca71af7072dfead69c5f87087
-
Filesize
114KB
MD5de5c90736dbdb0d8fc21ede2c708d290
SHA1bc2baef7a979f28ff93aac75da888d711fd597a9
SHA2569abc2b3d15d93426144af57d7c9603b21d6da70d523b3ae62695e854fe0240b0
SHA51238da6d0956eed49429ac84bac1212572553abbc3518b5fcff66db21f454b534b8c06ae57005b3f76c4036eccdef0c27b3895aacd3076aeef03c6db180b434c3a
-
Filesize
36B
MD5c0a3e3def46e91cd8c8c6a364b966376
SHA12c689f082b0183bf0e36e8c7eb33d3288b4a757d
SHA256e136a23b51c7e9c1a5a008bdeb14a5a63c9edad2a0d548f81a4501a77b05af62
SHA51255bec3f4fbc0898ccdb6215cb6434dd9405b5d7c12b8a64d94b5731362312c9ced2e4d181102f685cc14c519fb45d36d7deb8bd23f4faa62cee5c8b297365e30
-
Filesize
36B
MD579ed040afefacf9da4fa94c03d884311
SHA1c760690f6c0f0d73b38e39ec57677d0321261863
SHA256f19822d97376ce6af3f8b3b1a40fc19a59a59deb8ee2b4a0ef97792684e5ddf8
SHA512d8c8e75bbf8d640c6f5cd2913d1b282c788275a4641be1012c05010d8185e089016dd6d70e640207e39f7729b72768e66d9a0cb7d00abe285078223f6e834efe