Overview
overview
10Static
static
10f3beb34cc0...f7.exe
windows7-x64
4f3beb34cc0...f7.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3Bearly.exe
windows7-x64
1Bearly.exe
windows10-2004-x64
5LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...d.html
windows7-x64
1resources/...d.html
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 00:10
Behavioral task
behavioral1
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Bearly.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Bearly.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
locales/af.ps1
Resource
win7-20240508-en
Behavioral task
behavioral23
Sample
locales/af.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
locales/uk.ps1
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
resources/dist/pages/cantLoad.html
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
resources/dist/pages/cantLoad.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win7-20240508-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win7-20240419-en
General
-
Target
Bearly.exe
-
Size
154.7MB
-
MD5
88b6fcc98fa8fc9cc8f1a6feae35b6df
-
SHA1
3ad34fe3567d7fd7518fef99c0bb112c3c50464b
-
SHA256
a87607b53250badcf6829e42e0d5f84b1d47f1861b49de23135e44978b8d0f07
-
SHA512
c1a2b5cd7bd77faad31861305f0562e2a0c3f15ecc4bbcb1931d3064ed9ef6c8fd85f7fa0d7e723059153fa8ef5d598907e98dcf4f1c6e3a0e68c55fcef5a847
-
SSDEEP
1572864:4BtbwS6fGMIgBx5GZ7W1S9/kYGaWCLmXLnT2RGIfdZSHV0omQTk+R7BULUGSh6Tr:un9LLmXdd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Bearly.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Bearly.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\ = "URL:bearly" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\shell\open\command Bearly.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\shell Bearly.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\shell\open Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bearly.exe\" \"%1\"" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\bearly\URL Protocol Bearly.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1800 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3236 Bearly.exe 3236 Bearly.exe 4528 Bearly.exe 4528 Bearly.exe 1784 Bearly.exe 1784 Bearly.exe 1784 Bearly.exe 1784 Bearly.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe Token: SeShutdownPrivilege 1340 Bearly.exe Token: SeCreatePagefilePrivilege 1340 Bearly.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1340 Bearly.exe 1340 Bearly.exe 1340 Bearly.exe 1340 Bearly.exe 1340 Bearly.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1340 Bearly.exe 1340 Bearly.exe 1340 Bearly.exe 1340 Bearly.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1652 1340 Bearly.exe 90 PID 1340 wrote to memory of 1652 1340 Bearly.exe 90 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 4112 1340 Bearly.exe 91 PID 1340 wrote to memory of 3236 1340 Bearly.exe 92 PID 1340 wrote to memory of 3236 1340 Bearly.exe 92 PID 1340 wrote to memory of 4528 1340 Bearly.exe 93 PID 1340 wrote to memory of 4528 1340 Bearly.exe 93 PID 1340 wrote to memory of 1800 1340 Bearly.exe 94 PID 1340 wrote to memory of 1800 1340 Bearly.exe 94 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99 PID 1340 wrote to memory of 6800 1340 Bearly.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Bearly.exeC:\Users\Admin\AppData\Local\Temp\Bearly.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Bearly /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Bearly\Crashpad --url=https://f.a.k/e --annotation=_productName=Bearly --annotation=_version=3.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=24.4.0 --initial-client-data=0x448,0x46c,0x474,0x470,0x478,0x7ff62609dc70,0x7ff62609dc80,0x7ff62609dc902⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2008 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2388 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bearly2⤵
- Modifies registry key
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3572 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:6800
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3752 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5dc4e1fe5c28ec95e9e4c1485f04fbc73
SHA1434612619371f796e4b17007b4d09187eeda8b79
SHA2565e0ca337efae1d1a2cfa5e3f4d43e12d2de8417539b7c39f6d0293a6dbd3f91e
SHA512df4b6c3ea09bcd32864d97f9bc7e5365619accd4ae8936c5745c1f80b34ac0e5332d87270337580f48e4c55ecbc790e73d9d5250dd6b54e41c4b85f6ec33d3cd
-
Filesize
192B
MD5f3d391379f82ba2b82275b79cf4478b4
SHA11c08f96c3457ddf4b399451cb1a1fbbaf366949e
SHA256669fcd11af1798ef1ab0874b30ca3ac7043e71c7addf10624b5d67af17a2fbec
SHA512923e73d90f8d6b8fbe7fb37402152a9e61d910f566c99b8fca6c96b686b870e9a532b74f66b1e21f0a0e107377a8b5d19bf130ddf65934591fe00698a2e93be0
-
Filesize
1KB
MD5e9c0865ad8d66bdd4172147a466f3a0a
SHA1c9be7c7a7627390ae04f467e5f611779f6006712
SHA256376f94615b3fbbd3f5a3b63643cf4d35ed6a8884f8cf167678db5221e7b65f83
SHA5120940a22052ab734561c6dcf9ec588eaeb20b57da0c62e768e5d399cde924813045490fc186f06cb0df53f9d6c4995f51b5fcd91091ef6c0c7921ebaffb36fe05
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
72B
MD5b1209bf807974920a74d3a783dcfd794
SHA1ea6ba74dec57b93482aba095082b57636d5d6cea
SHA256431499756a68085405b0228ccd380ec20c4d2bebaf664031802fc7cab93c7397
SHA5123f321658c6b94c696466c1eb118f0d1d4757734e3cb40b9738c5a2dca95d3d26bffed9e4a94c8df7a15e49daa08ec2ac565d61a94e5e0190d27350ca187ea3f2
-
C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d86e.TMP
Filesize48B
MD5705efdf1cc8f2edb9c64ecb4f3386ee5
SHA155f0f699d5127026e73ec751d4489bf966220b6d
SHA256966d0595c6e2690d9aa9c79ce4af94d87f70c5b9960809e7b640b20a27490d69
SHA512b035896792af6d304b485d557c765f6a617e30961f4e5d0996266ca9c323adad531ed3a39720b99520a5037dc935aa0c19d1d18803268d5681e5780a14c04c13
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
34B
MD51ffb53e0bcfa1dfde7672728e3114815
SHA1ec46721ab0c27d9e707f63c2ee748c954d775de2
SHA2568e3ed5120a02820b427cb66f4f10c93aa4ca6415f332686b39174a6e04a70c76
SHA5125aaabd51ac0b126c05d881e07fdaf1d82e86f5c6b5aea347ea53ea507fad953409e213ca0ae05bbf0921b478b595fbdbfada1eafd5ec39fbb9454434f0f5d424
-
Filesize
64B
MD5b571feedd7a6cfefa26b73514d57a7c7
SHA133d4945a08a2040a4707b44d21483cd00858cb7d
SHA256bf7d1e5bafc682ba7bf07389750e4165fa3076e69625630998b4a528f5e6d635
SHA5128d2f594f4f568005005f2ba23bdd67ccdfd4bf56ada577993aaed596c839263f223dc2180897b906d8a8e94fd060eccda97a6cc2f464bd507182db45f4a017c7
-
Filesize
113B
MD50c2bb92bc63d59da117b6542b8ca9edb
SHA11841f159e4e2074fd921877937016a21ff4f0f90
SHA256dc011a83b38ed30c2eb64000cd76d92dd2fa807170fbe2dbab77bc5221471ab3
SHA5128b4f251a74afe73a4c8fa003b5e0d65b33ac642567c73500783f1339e892fe76f3e524d5b56faf0bdff6a799c9581136fe33ac6fc1f135400440ce05abd57e9f
-
Filesize
119B
MD506a780c111c244393ef5753c80af4986
SHA1792ffd61834bae12c91506f70366c55b549a0a3a
SHA2562e125366cdcd62de4bf010b0cac8ef4531f9b785a468c3d75191f93d35f6279c
SHA5127a98c6a729f99e54543e8eb2cabef3b8d7e6f4515caea9c8c1f4280d6cd5386932dfd0c59e4f3aed804d55bdb91187814e3378ed1e4b1cd7f32a7c891c02b740
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84