Overview
overview
5Static
static
1Bedless Client.zip
windows7-x64
1Bedless Client.zip
windows10-2004-x64
1Bedless Cl...s.json
windows7-x64
3Bedless Cl...s.json
windows10-2004-x64
3Bedless Cl...l.json
windows7-x64
3Bedless Cl...l.json
windows10-2004-x64
5Bedless Cl...s.json
windows7-x64
3Bedless Cl...s.json
windows10-2004-x64
3Bedless Cl...e.json
windows7-x64
3Bedless Cl...e.json
windows10-2004-x64
3Analysis
-
max time kernel
128s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 21:58
Static task
static1
Behavioral task
behavioral1
Sample
Bedless Client.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Bedless Client.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Bedless Client/controls.json
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Bedless Client/controls.json
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Bedless Client/general.json
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Bedless Client/general.json
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Bedless Client/mods.json
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Bedless Client/mods.json
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Bedless Client/performance.json
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Bedless Client/performance.json
Resource
win10v2004-20221111-en
General
-
Target
Bedless Client/general.json
-
Size
40B
-
MD5
9730f824ee4b461512b5eb0d90fe6ed4
-
SHA1
3a1e56af3757e9f21cfb818c552a4ce49751f82d
-
SHA256
e947ebea265931e303064f62555d4cafef4703ebdf8069a31937fb6432ad85ef
-
SHA512
88fd3f81a2c41779a9895fda77ae8336774e24b9c2be4646e79468225fca988ef4b2e94f63008934a288b0e65e236fba07682de85ddf4688bb40221b50f1d2d7
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{CDC94762-93B9-4DD7-BB40-F97D227D21C6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D80E6C1D-00E6-43BD-9E9F-5C7FDD598EB5}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Bedless Client\general.json"1⤵
- Modifies registry class
PID:2228
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:5028