Overview
overview
10Static
static
10f3beb34cc0...f7.exe
windows7-x64
4f3beb34cc0...f7.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3Bearly.exe
windows7-x64
1Bearly.exe
windows10-2004-x64
5LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...d.html
windows7-x64
1resources/...d.html
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 22:31
Behavioral task
behavioral1
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Bearly.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Bearly.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240220-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
locales/af.ps1
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
locales/af.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
locales/uk.ps1
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
resources/dist/pages/cantLoad.html
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
resources/dist/pages/cantLoad.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240220-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win7-20240508-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win7-20231129-en
General
-
Target
Bearly.exe
-
Size
154.7MB
-
MD5
88b6fcc98fa8fc9cc8f1a6feae35b6df
-
SHA1
3ad34fe3567d7fd7518fef99c0bb112c3c50464b
-
SHA256
a87607b53250badcf6829e42e0d5f84b1d47f1861b49de23135e44978b8d0f07
-
SHA512
c1a2b5cd7bd77faad31861305f0562e2a0c3f15ecc4bbcb1931d3064ed9ef6c8fd85f7fa0d7e723059153fa8ef5d598907e98dcf4f1c6e3a0e68c55fcef5a847
-
SSDEEP
1572864:4BtbwS6fGMIgBx5GZ7W1S9/kYGaWCLmXLnT2RGIfdZSHV0omQTk+R7BULUGSh6Tr:un9LLmXdd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Bearly.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Bearly.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\URL Protocol Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\ = "URL:bearly" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\shell\open\command Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\shell Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\shell\open Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bearly.exe\" \"%1\"" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\bearly Bearly.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5032 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 Bearly.exe 5068 Bearly.exe 2524 Bearly.exe 2524 Bearly.exe 6044 Bearly.exe 6044 Bearly.exe 6044 Bearly.exe 6044 Bearly.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe Token: SeShutdownPrivilege 4952 Bearly.exe Token: SeCreatePagefilePrivilege 4952 Bearly.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4952 Bearly.exe 4952 Bearly.exe 4952 Bearly.exe 4952 Bearly.exe 4952 Bearly.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4952 Bearly.exe 4952 Bearly.exe 4952 Bearly.exe 4952 Bearly.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3320 4952 Bearly.exe 81 PID 4952 wrote to memory of 3320 4952 Bearly.exe 81 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5064 4952 Bearly.exe 82 PID 4952 wrote to memory of 5068 4952 Bearly.exe 83 PID 4952 wrote to memory of 5068 4952 Bearly.exe 83 PID 4952 wrote to memory of 2524 4952 Bearly.exe 84 PID 4952 wrote to memory of 2524 4952 Bearly.exe 84 PID 4952 wrote to memory of 5032 4952 Bearly.exe 85 PID 4952 wrote to memory of 5032 4952 Bearly.exe 85 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87 PID 4952 wrote to memory of 4000 4952 Bearly.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Bearly.exeC:\Users\Admin\AppData\Local\Temp\Bearly.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Bearly /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Bearly\Crashpad --url=https://f.a.k/e --annotation=_productName=Bearly --annotation=_version=3.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=24.4.0 --initial-client-data=0x45c,0x464,0x468,0x438,0x46c,0x7ff682e9dc70,0x7ff682e9dc80,0x7ff682e9dc902⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1908 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2328 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bearly2⤵
- Modifies registry key
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3532 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3696 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 --field-trial-handle=1776,i,2837101430475838215,12833730332051973332,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
48B
MD511cb8256965d7c52f57f519e475061a9
SHA11e9e84ebb2c98ac7f7ebfcaa7a51e44c09baf096
SHA256f9599362d792d151285659dc0bd03be81246a55bbf26df418a2e7c37c5fc5149
SHA5129e251e52462f3cca882537d3905131273ec97f73398a3c6e51d21a3304a77bd9d5fa9746894d1ef69e95ec8a84e4cffd77b9d0ad42ef458eb0d4f5dda6c8fa9a
-
Filesize
192B
MD5fee23eff655c9dce8027012f9a7eaf2f
SHA11e73394157dcf3e8197f120ab639dbd84f8a00fa
SHA25650cc0f1ee0e5d43c15abeefad752a728e7c539aeb9fac0f89c7370a0a4402b55
SHA512defe436976f94d41bc0a812f93f2b2fca8533f58e272556af8a1aa609030e0a5c4c230b69ba414a4da31210ccedc2e4659a3f0869101cc9af8b2f763ec5bf950
-
Filesize
1KB
MD5974bd42c9c744978867933651326f420
SHA12058cabc0c2765422a69c61f04d5c26caab82300
SHA256124ff0441e7f1d268495071848e9bffdd3b119f9da5a4b48ffc8281838a66a9f
SHA5128c81912eacc1ae6a172cea89b28e9ff028997db83b0b4b7361ce00c75a26fac47aba561382a3e8ce62ceaa71f34ddca1935e44928a4ee77dd3159c3dc4079acb
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
72B
MD5e643816af29e308fe38545c29f0b4fec
SHA1ac010c54414605d241ef382f0c8ee33f04b1337f
SHA256a1d08649272425bda3fbb7e68939d680a6cd4c3bd966617a7d9b69fdfc018662
SHA5123a202d7704ac88cf884bf0f590073f9283a3129260eaee895f8ecc9e8a17c054a6e036c0fcb64cadeed046d7d2ac6a4c35a3d3759a1c7bf03eed53d490a8875f
-
C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b834.TMP
Filesize48B
MD5534b87e7cbf2eb2822fb9b9cb3032793
SHA1a551263e35aa5c267e84f9a7266b5132c559a75a
SHA256d7e65216cf671c66a01b06b62df32d262785e7926dac4070271b885e31a692bc
SHA51238af2a9f450b88024d339a6835da31d873eaa23cefa37ab6834bd182b43f9cf6ed5344e05f0e99460eb52e3bc3fb1591f058c28c7f15b4fc231a6737d50ae2d7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
34B
MD51ffb53e0bcfa1dfde7672728e3114815
SHA1ec46721ab0c27d9e707f63c2ee748c954d775de2
SHA2568e3ed5120a02820b427cb66f4f10c93aa4ca6415f332686b39174a6e04a70c76
SHA5125aaabd51ac0b126c05d881e07fdaf1d82e86f5c6b5aea347ea53ea507fad953409e213ca0ae05bbf0921b478b595fbdbfada1eafd5ec39fbb9454434f0f5d424
-
Filesize
64B
MD5b571feedd7a6cfefa26b73514d57a7c7
SHA133d4945a08a2040a4707b44d21483cd00858cb7d
SHA256bf7d1e5bafc682ba7bf07389750e4165fa3076e69625630998b4a528f5e6d635
SHA5128d2f594f4f568005005f2ba23bdd67ccdfd4bf56ada577993aaed596c839263f223dc2180897b906d8a8e94fd060eccda97a6cc2f464bd507182db45f4a017c7
-
Filesize
113B
MD50c2bb92bc63d59da117b6542b8ca9edb
SHA11841f159e4e2074fd921877937016a21ff4f0f90
SHA256dc011a83b38ed30c2eb64000cd76d92dd2fa807170fbe2dbab77bc5221471ab3
SHA5128b4f251a74afe73a4c8fa003b5e0d65b33ac642567c73500783f1339e892fe76f3e524d5b56faf0bdff6a799c9581136fe33ac6fc1f135400440ce05abd57e9f
-
Filesize
119B
MD506a780c111c244393ef5753c80af4986
SHA1792ffd61834bae12c91506f70366c55b549a0a3a
SHA2562e125366cdcd62de4bf010b0cac8ef4531f9b785a468c3d75191f93d35f6279c
SHA5127a98c6a729f99e54543e8eb2cabef3b8d7e6f4515caea9c8c1f4280d6cd5386932dfd0c59e4f3aed804d55bdb91187814e3378ed1e4b1cd7f32a7c891c02b740
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84