Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
98s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/06/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe
Resource
win11-20240508-en
General
-
Target
BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe
-
Size
910KB
-
MD5
80ff5d3b21f79bef9376b9a8867167da
-
SHA1
9f282460ebc7297939c8f8dc0daa667e18a45d0a
-
SHA256
1e6004b45a0f41da07ca7e3cfe7530ebddaebfad05c13023ca16cef94b9265a0
-
SHA512
4c12153afa3ad66ab2cb6fdcd11ff868eead53f879b06c3f05fe9c5196c8c47b90206a5f88571783ecc203495738fc48508f8bcc679d0e82f9536556c58ba9b2
-
SSDEEP
12288:CivtCXQd0gjKX7zuqGKcD779TxgE98I17YpNgc8gJ67yY9lAFmNek7ra8MDVFnKg:CivtCXWeGKc9Txt9Okc/WmSrLbLvhYh
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3020 BlueStacksInstaller.exe 2112 HD-CheckCpu.exe 3176 HD-CheckCpu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3020 BlueStacksInstaller.exe 3020 BlueStacksInstaller.exe 3020 BlueStacksInstaller.exe 3020 BlueStacksInstaller.exe 3020 BlueStacksInstaller.exe 3020 BlueStacksInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 BlueStacksInstaller.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4884 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3020 3004 BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe 77 PID 3004 wrote to memory of 3020 3004 BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe 77 PID 3020 wrote to memory of 2112 3020 BlueStacksInstaller.exe 82 PID 3020 wrote to memory of 2112 3020 BlueStacksInstaller.exe 82 PID 3020 wrote to memory of 2112 3020 BlueStacksInstaller.exe 82 PID 3020 wrote to memory of 3176 3020 BlueStacksInstaller.exe 84 PID 3020 wrote to memory of 3176 3020 BlueStacksInstaller.exe 84 PID 3020 wrote to memory of 3176 3020 BlueStacksInstaller.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe"C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.20.0.1005_native_a0e0155c7e586ffd8134dd53396d0ee7_MDs1LDM7MTUsMTsxNSw0OzE1 - Copy (2).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\BlueStacksInstaller.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe" --cmd checkHypervEnabled3⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSCBB31227\HD-CheckCpu.exe" --cmd checkSSE43⤵
- Executes dropped EXE
PID:3176
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5a71ab244d565671f741686cb2c5ed11b
SHA1b6e766a85f1f878d512f752df2dd4873971755e2
SHA25606a5716962f3b50a8aa3acd30e33d6c75664465c3d795196ad6dce5e33a80faa
SHA5120826c8e52b0f5dbcbda745f06390fd59ce9eee8e0e845cdb007f4a97b19065f2544ca63226b34d361adf9e1cf26644672abfe5dcfd75651cd2aeb1ae27f16f84
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD544408d8bcd8c4ffe97a60ddf16281885
SHA1ab8773e27c92a24e12969dd4dc6bb8422f15d589
SHA256a6047cddc1126bc128da907db3550e725647640752e6a5c71ce9445735a9e83a
SHA512ff4e382bd3d00515f57bb735c6ffce35afd9f63a8def25ba18f722e618ac9f107e31e0ab44ff7758394e9ca7f52bc67b0ba70710c4dfd6afdb470a34093a35c6
-
Filesize
670B
MD526eb04b9e0105a7b121ea9c6601bbf2a
SHA1efc08370d90c8173df8d8c4b122d2bb64c07ccd8
SHA2567aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157
SHA5129df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68
-
Filesize
279B
MD503903fd42ed2ee3cb014f0f3b410bcb4
SHA1762a95240607fe8a304867a46bc2d677f494f5c2
SHA256076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1
SHA5128b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857
-
Filesize
212B
MD51504b80f2a6f2d3fefc305da54a2a6c2
SHA1432a9d89ebc2f693836d3c2f0743ea5d2077848d
SHA2562f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6
SHA512675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94
-
Filesize
623KB
MD5cc041375a535f92ecaeda1672b5677da
SHA1ef38cc04d88f8070af259567b108ac031fca7614
SHA256ea1e6c9644acc3611928c221cb9669fb99dbbda3a55a6a7fb819f6e52e4c538c
SHA5122949c50a70fb5f87c8f809f96d4dc3c600515b000feaf38b9e7dd132936024aa7d14aef3183b666cb8ddf947ee8d5ac5ea555cb211c685d88657995333284b16
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
200KB
MD581234fd9895897b8d1f5e6772a1b38d0
SHA180b2fec4a85ed90c4db2f09b63bd8f37038db0d3
SHA2562e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c
SHA5124c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
19KB
MD5206562eed57e938afe21fc6942fa8e59
SHA1779e90fec866c0fd2f47da020651db71c89ec3dd
SHA25627d611a71edf36307a7ed0651f6c5910292ac7e2b68074a7e33d306b3d93ec45
SHA512275c3192a7aee28fad31beb521cf5e7c66010e7562ce244ba9fc4de352f35b4ab63180ed12a56ea0b1458c185e076e2d07ba6d8797467177d3c5b2ac14371b26
-
Filesize
80KB
MD5c3e6bab4f92ee40b9453821136878993
SHA194493a6b3dfb3135e5775b7d3be227659856fbc4
SHA256de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6
SHA512a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895