Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
BlueStacksMicroInstaller_5.21.210.1023_native.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
BlueStacksMicroInstaller_5.21.210.1023_native.exe
Resource
win10v2004-20240508-en
General
-
Target
BlueStacksMicroInstaller_5.21.210.1023_native.exe
-
Size
910KB
-
MD5
d2c72208f8783ec83b123324e8093cc1
-
SHA1
4afbc9f19f8a194bccd5216e05083e0d7617fff0
-
SHA256
52ed4671a31c8529f2ba3027e25080c842d09f0517fe64e844f93d619cb4dd26
-
SHA512
03b7c6511e32f9822a42182776b2f862bae7627a2df374f874df05f3d46f90857a37afaf12d7d29a960f5d22536878dea9240c5872d84c9835663d219c5d531a
-
SSDEEP
24576:0ivtCXWeGK69Txt9OkcXGgrwPgZNYtOvLm:xtCXWPXvz5cXGcwPgZOtcLm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation BlueStacksMicroInstaller_5.21.210.1023_native.exe -
Executes dropped EXE 3 IoCs
pid Process 3944 BlueStacksInstaller.exe 4212 HD-CheckCpu.exe 2640 HD-CheckCpu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3944 BlueStacksInstaller.exe 3944 BlueStacksInstaller.exe 3944 BlueStacksInstaller.exe 3944 BlueStacksInstaller.exe 3944 BlueStacksInstaller.exe 3944 BlueStacksInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3944 BlueStacksInstaller.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3944 1780 BlueStacksMicroInstaller_5.21.210.1023_native.exe 82 PID 1780 wrote to memory of 3944 1780 BlueStacksMicroInstaller_5.21.210.1023_native.exe 82 PID 3944 wrote to memory of 4212 3944 BlueStacksInstaller.exe 87 PID 3944 wrote to memory of 4212 3944 BlueStacksInstaller.exe 87 PID 3944 wrote to memory of 4212 3944 BlueStacksInstaller.exe 87 PID 3944 wrote to memory of 2640 3944 BlueStacksInstaller.exe 89 PID 3944 wrote to memory of 2640 3944 BlueStacksInstaller.exe 89 PID 3944 wrote to memory of 2640 3944 BlueStacksInstaller.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlueStacksMicroInstaller_5.21.210.1023_native.exe"C:\Users\Admin\AppData\Local\Temp\BlueStacksMicroInstaller_5.21.210.1023_native.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\BlueStacksInstaller.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\HD-CheckCpu.exe" --cmd checkHypervEnabled3⤵
- Executes dropped EXE
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS4F6AE277\HD-CheckCpu.exe" --cmd checkSSE43⤵
- Executes dropped EXE
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670B
MD526eb04b9e0105a7b121ea9c6601bbf2a
SHA1efc08370d90c8173df8d8c4b122d2bb64c07ccd8
SHA2567aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157
SHA5129df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68
-
Filesize
279B
MD503903fd42ed2ee3cb014f0f3b410bcb4
SHA1762a95240607fe8a304867a46bc2d677f494f5c2
SHA256076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1
SHA5128b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857
-
Filesize
212B
MD51504b80f2a6f2d3fefc305da54a2a6c2
SHA1432a9d89ebc2f693836d3c2f0743ea5d2077848d
SHA2562f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6
SHA512675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94
-
Filesize
623KB
MD5c8ec5e0af9329936df1fb6382f092687
SHA1fc8a59149198e5acef2ca6a51f01d1e3ff0f50fe
SHA2567b3fcbf635508cde1dd74e41b3914f5b85bdb8de1bcece745ac6a05ddfde63da
SHA5121bd43948428d964b94befe7e2b9cd74e0cb5d6af76f5adb166323510b2f775ae479e781df104222197ac5e04e83e885cf6a5ec65c7bb3c5aebd45dead24439cf
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
200KB
MD581234fd9895897b8d1f5e6772a1b38d0
SHA180b2fec4a85ed90c4db2f09b63bd8f37038db0d3
SHA2562e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c
SHA5124c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
19KB
MD5206562eed57e938afe21fc6942fa8e59
SHA1779e90fec866c0fd2f47da020651db71c89ec3dd
SHA25627d611a71edf36307a7ed0651f6c5910292ac7e2b68074a7e33d306b3d93ec45
SHA512275c3192a7aee28fad31beb521cf5e7c66010e7562ce244ba9fc4de352f35b4ab63180ed12a56ea0b1458c185e076e2d07ba6d8797467177d3c5b2ac14371b26
-
Filesize
80KB
MD5c3e6bab4f92ee40b9453821136878993
SHA194493a6b3dfb3135e5775b7d3be227659856fbc4
SHA256de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6
SHA512a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895