Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/06/2024, 17:18

General

  • Target

    BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe

  • Size

    910KB

  • MD5

    80ff5d3b21f79bef9376b9a8867167da

  • SHA1

    9f282460ebc7297939c8f8dc0daa667e18a45d0a

  • SHA256

    1e6004b45a0f41da07ca7e3cfe7530ebddaebfad05c13023ca16cef94b9265a0

  • SHA512

    4c12153afa3ad66ab2cb6fdcd11ff868eead53f879b06c3f05fe9c5196c8c47b90206a5f88571783ecc203495738fc48508f8bcc679d0e82f9536556c58ba9b2

  • SSDEEP

    12288:CivtCXQd0gjKX7zuqGKcD779TxgE98I17YpNgc8gJ67yY9lAFmNek7ra8MDVFnKg:CivtCXWeGKc9Txt9Okc/WmSrLbLvhYh

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe
    "C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe" --cmd checkHypervEnabled
        3⤵
        • Executes dropped EXE
        PID:2112
      • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe" --cmd checkSSE4
        3⤵
        • Executes dropped EXE
        PID:3176
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    a71ab244d565671f741686cb2c5ed11b

    SHA1

    b6e766a85f1f878d512f752df2dd4873971755e2

    SHA256

    06a5716962f3b50a8aa3acd30e33d6c75664465c3d795196ad6dce5e33a80faa

    SHA512

    0826c8e52b0f5dbcbda745f06390fd59ce9eee8e0e845cdb007f4a97b19065f2544ca63226b34d361adf9e1cf26644672abfe5dcfd75651cd2aeb1ae27f16f84

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    44408d8bcd8c4ffe97a60ddf16281885

    SHA1

    ab8773e27c92a24e12969dd4dc6bb8422f15d589

    SHA256

    a6047cddc1126bc128da907db3550e725647640752e6a5c71ce9445735a9e83a

    SHA512

    ff4e382bd3d00515f57bb735c6ffce35afd9f63a8def25ba18f722e618ac9f107e31e0ab44ff7758394e9ca7f52bc67b0ba70710c4dfd6afdb470a34093a35c6

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\Assets\exit_close.png

    Filesize

    670B

    MD5

    26eb04b9e0105a7b121ea9c6601bbf2a

    SHA1

    efc08370d90c8173df8d8c4b122d2bb64c07ccd8

    SHA256

    7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

    SHA512

    9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\Assets\loader.png

    Filesize

    279B

    MD5

    03903fd42ed2ee3cb014f0f3b410bcb4

    SHA1

    762a95240607fe8a304867a46bc2d677f494f5c2

    SHA256

    076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

    SHA512

    8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\Assets\minimize_progress.png

    Filesize

    212B

    MD5

    1504b80f2a6f2d3fefc305da54a2a6c2

    SHA1

    432a9d89ebc2f693836d3c2f0743ea5d2077848d

    SHA256

    2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

    SHA512

    675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe

    Filesize

    623KB

    MD5

    cc041375a535f92ecaeda1672b5677da

    SHA1

    ef38cc04d88f8070af259567b108ac031fca7614

    SHA256

    ea1e6c9644acc3611928c221cb9669fb99dbbda3a55a6a7fb819f6e52e4c538c

    SHA512

    2949c50a70fb5f87c8f809f96d4dc3c600515b000feaf38b9e7dd132936024aa7d14aef3183b666cb8ddf947ee8d5ac5ea555cb211c685d88657995333284b16

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe.config

    Filesize

    324B

    MD5

    1b456d88546e29f4f007cd0bf1025703

    SHA1

    e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

    SHA256

    d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

    SHA512

    c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe

    Filesize

    200KB

    MD5

    81234fd9895897b8d1f5e6772a1b38d0

    SHA1

    80b2fec4a85ed90c4db2f09b63bd8f37038db0d3

    SHA256

    2e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c

    SHA512

    4c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\JSON.dll

    Filesize

    411KB

    MD5

    f5fd966e29f5c359f78cb61a571d1be4

    SHA1

    a55e7ed593b4bc7a77586da0f1223cfd9d51a233

    SHA256

    d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

    SHA512

    d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\Locales\i18n.en-US.txt

    Filesize

    19KB

    MD5

    206562eed57e938afe21fc6942fa8e59

    SHA1

    779e90fec866c0fd2f47da020651db71c89ec3dd

    SHA256

    27d611a71edf36307a7ed0651f6c5910292ac7e2b68074a7e33d306b3d93ec45

    SHA512

    275c3192a7aee28fad31beb521cf5e7c66010e7562ce244ba9fc4de352f35b4ab63180ed12a56ea0b1458c185e076e2d07ba6d8797467177d3c5b2ac14371b26

  • C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\ThemeFile

    Filesize

    80KB

    MD5

    c3e6bab4f92ee40b9453821136878993

    SHA1

    94493a6b3dfb3135e5775b7d3be227659856fbc4

    SHA256

    de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

    SHA512

    a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

  • memory/3020-122-0x000000001B8D0000-0x000000001B938000-memory.dmp

    Filesize

    416KB

  • memory/3020-148-0x000000001CB60000-0x000000001D088000-memory.dmp

    Filesize

    5.2MB

  • memory/3020-123-0x00007FFB9C410000-0x00007FFB9CED2000-memory.dmp

    Filesize

    10.8MB

  • memory/3020-152-0x000000001F1C0000-0x000000001F1CE000-memory.dmp

    Filesize

    56KB

  • memory/3020-151-0x000000001F200000-0x000000001F238000-memory.dmp

    Filesize

    224KB

  • memory/3020-155-0x00007FFB9C410000-0x00007FFB9CED2000-memory.dmp

    Filesize

    10.8MB

  • memory/3020-119-0x00000000009F0000-0x0000000000A8E000-memory.dmp

    Filesize

    632KB

  • memory/3020-120-0x00007FFB9C413000-0x00007FFB9C415000-memory.dmp

    Filesize

    8KB

  • memory/3020-158-0x000000001C190000-0x000000001C198000-memory.dmp

    Filesize

    32KB