Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 08:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bluestacks.com/
Resource
win11-20240704-en
General
-
Target
https://www.bluestacks.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647282250740238" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 944 chrome.exe 944 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 944 chrome.exe 944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 1640 944 chrome.exe 77 PID 944 wrote to memory of 1640 944 chrome.exe 77 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 1920 944 chrome.exe 78 PID 944 wrote to memory of 4412 944 chrome.exe 79 PID 944 wrote to memory of 4412 944 chrome.exe 79 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80 PID 944 wrote to memory of 2316 944 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.bluestacks.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd3efab58,0x7fffd3efab68,0x7fffd3efab782⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:22⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 --field-trial-handle=1796,i,5233964271259645432,10079227003534726101,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5b6cd4f8bf35225c71665227567cbaf96
SHA19cee742b9ec7c233f6dd0544ffbad04b84e07de0
SHA2565d16e94bb8d6c2bb0fdb3c8de884a4d7f56af8c9de90aeb114bd6e4856e9c540
SHA512c859ec939a0e1d6bbf10f0831237f4fa4440c849e8cb4f5c1b0699e265e7472d5e64be3846cf97d21154c97eb18f9f05fb4ba7256afa7ec0b111f27c6ba04308
-
Filesize
3KB
MD5cd1a5b1a9e043dfe6ac1119557704ec6
SHA14a7bc85a51dd37408a0f99beb7d0879329201c74
SHA256fb952ead85d68e887127f7046c7696aad571e41c94707a99926e95fa817d246c
SHA51223faad75421d9a3cb6bfc5aca0d6e61fdc400185ad0f28b863328744c11206b376d133057fffb519c9aa62be03680ee129b9822ad4fbaf68db3443f01d86ccbb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5fb79b93e7a00e353c751e46a3946f035
SHA14b053cda24682679d542579efe23d007c3b53a9a
SHA2567cefe4e007d9f9de8f032bf233971652bedb8e86991ad7b322fa4802e9183e4d
SHA51284674918c26cfbeb569258303e09e05881f07b8b202ac0b5ab900e67bed8f76b7c7f303900be8b0aa9ac62392fbcead2549e8cf35791b9eebda4f3734de73918
-
Filesize
7KB
MD5a7ef59063ac86957614bda20c21a959b
SHA1f559f6ca8b7ecbe8ae2855bc72f20c5e0bf4a61e
SHA256b9779eb0950bec79b1f4646865cf0cd838ca11bde6f8b6f82f3160c366c77c98
SHA512269bd3c7e4869fee5330eb0fc512a72657a2755c5de505bbadcc89e6a58a1dbd9febb798ae97cd7a84dfe846811b55276d308dff3c13de3af7d107c9436d2f2d
-
Filesize
144KB
MD57edb4c3033e8a105ebda4f48663d9d93
SHA10146eb7dc7c8f08f91a6ac86a506360030f00e21
SHA25658e090390b0ba13239d71a8a8edb0056a89a4c7f83e2d1aca51076d5d9e0392a
SHA512bf43395d879a3a1ed501bc91a0e08cc1d4284760a85dfb89d60733aecc36af0ce19703421fe1ed2f7611507f1c514bb2ef5ef237cc926c0589aa19b663fe9537