Resubmissions

07-07-2024 01:45

240707-b6jz2azfrp 7

07-07-2024 01:39

240707-b21rzsselc 6

Analysis

  • max time kernel
    199s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 01:39

General

  • Target

    BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe

  • Size

    911KB

  • MD5

    05cd50890a8efa95d686384d2d96c530

  • SHA1

    ad496d950142315aa8662edb002549e84d3de424

  • SHA256

    6d996f70f6b9f99e4ae0aad1f28d224c84c22194551ca4e21f56127eb563faea

  • SHA512

    6dc050e3c6577299ba4bcc306d1866ddea3eb2499f75f1de96e435d03f03b0ccf4021602be0eb6c816d7a0e81ce29590de247a084d67e88a64fa6ced4043bcf3

  • SSDEEP

    24576:bivtCXWeGKM8WolR74uEFQWa3GZllJCGt3:+tCXWPIWofUuCQWa25JN3

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe
    "C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.218.1001_native_51fc3b1a41380306ef41deb4aa5254d9_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe" --cmd checkHypervEnabled
        3⤵
        • Executes dropped EXE
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe" --cmd checkSSE4
        3⤵
        • Executes dropped EXE
        PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\Assets\change_hover.png

    Filesize

    310B

    MD5

    57092634754fc26e5515e3ed5ca7d461

    SHA1

    3ae4d01db9d6bba535f5292298502193dfc02710

    SHA256

    8e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1

    SHA512

    553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\Assets\exit_close.png

    Filesize

    670B

    MD5

    26eb04b9e0105a7b121ea9c6601bbf2a

    SHA1

    efc08370d90c8173df8d8c4b122d2bb64c07ccd8

    SHA256

    7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

    SHA512

    9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\Assets\loader.png

    Filesize

    279B

    MD5

    03903fd42ed2ee3cb014f0f3b410bcb4

    SHA1

    762a95240607fe8a304867a46bc2d677f494f5c2

    SHA256

    076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

    SHA512

    8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\Assets\minimize_progress.png

    Filesize

    212B

    MD5

    1504b80f2a6f2d3fefc305da54a2a6c2

    SHA1

    432a9d89ebc2f693836d3c2f0743ea5d2077848d

    SHA256

    2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

    SHA512

    675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe

    Filesize

    623KB

    MD5

    f51cd98b34ad6b81081e1a017f5c45bc

    SHA1

    e734d4f3d81d517b2a2eafaf20310bc94a419207

    SHA256

    02ca17eaa0f8eec7e7d321756fd73bb8292f2de7f3585d567ecf6f56b4f037f6

    SHA512

    1b87f6b7c0ac1825a3bd76bebda7e90ebc8293b889a3f39a4513ce04800fcd516e5d8597db379275ed324afb5c7f868afb31d1c965922b434de6968c94c47184

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\BlueStacksInstaller.exe.config

    Filesize

    324B

    MD5

    1b456d88546e29f4f007cd0bf1025703

    SHA1

    e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

    SHA256

    d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

    SHA512

    c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\HD-CheckCpu.exe

    Filesize

    200KB

    MD5

    81234fd9895897b8d1f5e6772a1b38d0

    SHA1

    80b2fec4a85ed90c4db2f09b63bd8f37038db0d3

    SHA256

    2e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c

    SHA512

    4c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\JSON.dll

    Filesize

    411KB

    MD5

    f5fd966e29f5c359f78cb61a571d1be4

    SHA1

    a55e7ed593b4bc7a77586da0f1223cfd9d51a233

    SHA256

    d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

    SHA512

    d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\Locales\i18n.en-US.txt

    Filesize

    19KB

    MD5

    0a041eb21be673b37a9a43f751d83400

    SHA1

    cf98837aeb730d05ec55252277d2ed41ef58f0ba

    SHA256

    708132b01a012c3a43a5a7e5550318f6fe72a98139bba7e4f5fb352b9e46db29

    SHA512

    476051e9cc528c8b72a1ff0aec6f9e05cce4e7069ff4af7e75558664f02a7018304a4d840e694ee811d08895b628da072b1c72b8f605e4212b75a84db66b8b14

  • C:\Users\Admin\AppData\Local\Temp\7zSC40A9417\ThemeFile

    Filesize

    80KB

    MD5

    c3e6bab4f92ee40b9453821136878993

    SHA1

    94493a6b3dfb3135e5775b7d3be227659856fbc4

    SHA256

    de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

    SHA512

    a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

  • memory/4232-128-0x000000001CBB0000-0x000000001CC18000-memory.dmp

    Filesize

    416KB

  • memory/4232-143-0x0000000020670000-0x00000000206A8000-memory.dmp

    Filesize

    224KB

  • memory/4232-138-0x000000001DEC0000-0x000000001E3E8000-memory.dmp

    Filesize

    5.2MB

  • memory/4232-141-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-129-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-142-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-144-0x0000000020630000-0x000000002063E000-memory.dmp

    Filesize

    56KB

  • memory/4232-137-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-146-0x00007FF9F8C03000-0x00007FF9F8C05000-memory.dmp

    Filesize

    8KB

  • memory/4232-147-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-126-0x00000000006E0000-0x000000000077E000-memory.dmp

    Filesize

    632KB

  • memory/4232-125-0x00007FF9F8C03000-0x00007FF9F8C05000-memory.dmp

    Filesize

    8KB

  • memory/4232-150-0x000000001D4A0000-0x000000001D4A8000-memory.dmp

    Filesize

    32KB

  • memory/4232-151-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-152-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4232-155-0x00007FF9F8C00000-0x00007FF9F96C1000-memory.dmp

    Filesize

    10.8MB