Analysis
-
max time kernel
199s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe
Resource
win10v2004-20240508-en
General
-
Target
BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe
-
Size
911KB
-
MD5
05cd50890a8efa95d686384d2d96c530
-
SHA1
ad496d950142315aa8662edb002549e84d3de424
-
SHA256
6d996f70f6b9f99e4ae0aad1f28d224c84c22194551ca4e21f56127eb563faea
-
SHA512
6dc050e3c6577299ba4bcc306d1866ddea3eb2499f75f1de96e435d03f03b0ccf4021602be0eb6c816d7a0e81ce29590de247a084d67e88a64fa6ced4043bcf3
-
SSDEEP
24576:bivtCXWeGKM8WolR74uEFQWa3GZllJCGt3:+tCXWPIWofUuCQWa25JN3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe -
Executes dropped EXE 3 IoCs
pid Process 4232 BlueStacksInstaller.exe 2348 HD-CheckCpu.exe 2308 HD-CheckCpu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4232 BlueStacksInstaller.exe 4232 BlueStacksInstaller.exe 4232 BlueStacksInstaller.exe 4232 BlueStacksInstaller.exe 4232 BlueStacksInstaller.exe 4232 BlueStacksInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4232 BlueStacksInstaller.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4232 4172 BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe 81 PID 4172 wrote to memory of 4232 4172 BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe 81 PID 4232 wrote to memory of 2348 4232 BlueStacksInstaller.exe 83 PID 4232 wrote to memory of 2348 4232 BlueStacksInstaller.exe 83 PID 4232 wrote to memory of 2348 4232 BlueStacksInstaller.exe 83 PID 4232 wrote to memory of 2308 4232 BlueStacksInstaller.exe 85 PID 4232 wrote to memory of 2308 4232 BlueStacksInstaller.exe 85 PID 4232 wrote to memory of 2308 4232 BlueStacksInstaller.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe" --cmd checkHypervEnabled3⤵
- Executes dropped EXE
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe" --cmd checkSSE43⤵
- Executes dropped EXE
PID:2308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD557092634754fc26e5515e3ed5ca7d461
SHA13ae4d01db9d6bba535f5292298502193dfc02710
SHA2568e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1
SHA512553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a
-
Filesize
670B
MD526eb04b9e0105a7b121ea9c6601bbf2a
SHA1efc08370d90c8173df8d8c4b122d2bb64c07ccd8
SHA2567aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157
SHA5129df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68
-
Filesize
279B
MD503903fd42ed2ee3cb014f0f3b410bcb4
SHA1762a95240607fe8a304867a46bc2d677f494f5c2
SHA256076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1
SHA5128b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857
-
Filesize
212B
MD51504b80f2a6f2d3fefc305da54a2a6c2
SHA1432a9d89ebc2f693836d3c2f0743ea5d2077848d
SHA2562f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6
SHA512675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94
-
Filesize
623KB
MD5f51cd98b34ad6b81081e1a017f5c45bc
SHA1e734d4f3d81d517b2a2eafaf20310bc94a419207
SHA25602ca17eaa0f8eec7e7d321756fd73bb8292f2de7f3585d567ecf6f56b4f037f6
SHA5121b87f6b7c0ac1825a3bd76bebda7e90ebc8293b889a3f39a4513ce04800fcd516e5d8597db379275ed324afb5c7f868afb31d1c965922b434de6968c94c47184
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
200KB
MD581234fd9895897b8d1f5e6772a1b38d0
SHA180b2fec4a85ed90c4db2f09b63bd8f37038db0d3
SHA2562e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c
SHA5124c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
19KB
MD50a041eb21be673b37a9a43f751d83400
SHA1cf98837aeb730d05ec55252277d2ed41ef58f0ba
SHA256708132b01a012c3a43a5a7e5550318f6fe72a98139bba7e4f5fb352b9e46db29
SHA512476051e9cc528c8b72a1ff0aec6f9e05cce4e7069ff4af7e75558664f02a7018304a4d840e694ee811d08895b628da072b1c72b8f605e4212b75a84db66b8b14
-
Filesize
80KB
MD5c3e6bab4f92ee40b9453821136878993
SHA194493a6b3dfb3135e5775b7d3be227659856fbc4
SHA256de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6
SHA512a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895