Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 00:10

General

  • Target

    Bearly.exe

  • Size

    154.7MB

  • MD5

    88b6fcc98fa8fc9cc8f1a6feae35b6df

  • SHA1

    3ad34fe3567d7fd7518fef99c0bb112c3c50464b

  • SHA256

    a87607b53250badcf6829e42e0d5f84b1d47f1861b49de23135e44978b8d0f07

  • SHA512

    c1a2b5cd7bd77faad31861305f0562e2a0c3f15ecc4bbcb1931d3064ed9ef6c8fd85f7fa0d7e723059153fa8ef5d598907e98dcf4f1c6e3a0e68c55fcef5a847

  • SSDEEP

    1572864:4BtbwS6fGMIgBx5GZ7W1S9/kYGaWCLmXLnT2RGIfdZSHV0omQTk+R7BULUGSh6Tr:un9LLmXdd

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
    "C:\Users\Admin\AppData\Local\Temp\Bearly.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
      C:\Users\Admin\AppData\Local\Temp\Bearly.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Bearly /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Bearly\Crashpad --url=https://f.a.k/e --annotation=_productName=Bearly --annotation=_version=3.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=24.4.0 --initial-client-data=0x448,0x46c,0x474,0x470,0x478,0x7ff62609dc70,0x7ff62609dc80,0x7ff62609dc90
      2⤵
        PID:1652
      • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
        "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:4112
        • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
          "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2008 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3236
        • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
          "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2388 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          PID:4528
        • C:\Windows\system32\reg.exe
          C:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bearly
          2⤵
          • Modifies registry key
          PID:1800
        • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
          "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3572 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:6800
        • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
          "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3752 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:5140
        • C:\Users\Admin\AppData\Local\Temp\Bearly.exe
          "C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1776,i,6996377932673691481,9819449996174290091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1784

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Bearly\Code Cache\js\index-dir\the-real-index

              Filesize

              48B

              MD5

              dc4e1fe5c28ec95e9e4c1485f04fbc73

              SHA1

              434612619371f796e4b17007b4d09187eeda8b79

              SHA256

              5e0ca337efae1d1a2cfa5e3f4d43e12d2de8417539b7c39f6d0293a6dbd3f91e

              SHA512

              df4b6c3ea09bcd32864d97f9bc7e5365619accd4ae8936c5745c1f80b34ac0e5332d87270337580f48e4c55ecbc790e73d9d5250dd6b54e41c4b85f6ec33d3cd

            • C:\Users\Admin\AppData\Roaming\Bearly\Code Cache\js\index-dir\the-real-index

              Filesize

              192B

              MD5

              f3d391379f82ba2b82275b79cf4478b4

              SHA1

              1c08f96c3457ddf4b399451cb1a1fbbaf366949e

              SHA256

              669fcd11af1798ef1ab0874b30ca3ac7043e71c7addf10624b5d67af17a2fbec

              SHA512

              923e73d90f8d6b8fbe7fb37402152a9e61d910f566c99b8fca6c96b686b870e9a532b74f66b1e21f0a0e107377a8b5d19bf130ddf65934591fe00698a2e93be0

            • C:\Users\Admin\AppData\Roaming\Bearly\Network\Network Persistent State

              Filesize

              1KB

              MD5

              e9c0865ad8d66bdd4172147a466f3a0a

              SHA1

              c9be7c7a7627390ae04f467e5f611779f6006712

              SHA256

              376f94615b3fbbd3f5a3b63643cf4d35ed6a8884f8cf167678db5221e7b65f83

              SHA512

              0940a22052ab734561c6dcf9ec588eaeb20b57da0c62e768e5d399cde924813045490fc186f06cb0df53f9d6c4995f51b5fcd91091ef6c0c7921ebaffb36fe05

            • C:\Users\Admin\AppData\Roaming\Bearly\Network\Network Persistent State~RFe5898ef.TMP

              Filesize

              59B

              MD5

              2800881c775077e1c4b6e06bf4676de4

              SHA1

              2873631068c8b3b9495638c865915be822442c8b

              SHA256

              226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

              SHA512

              e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

            • C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\Database\MANIFEST-000001

              Filesize

              41B

              MD5

              5af87dfd673ba2115e2fcf5cfdb727ab

              SHA1

              d5b5bbf396dc291274584ef71f444f420b6056f1

              SHA256

              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

              SHA512

              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

            • C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index

              Filesize

              72B

              MD5

              b1209bf807974920a74d3a783dcfd794

              SHA1

              ea6ba74dec57b93482aba095082b57636d5d6cea

              SHA256

              431499756a68085405b0228ccd380ec20c4d2bebaf664031802fc7cab93c7397

              SHA512

              3f321658c6b94c696466c1eb118f0d1d4757734e3cb40b9738c5a2dca95d3d26bffed9e4a94c8df7a15e49daa08ec2ac565d61a94e5e0190d27350ca187ea3f2

            • C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d86e.TMP

              Filesize

              48B

              MD5

              705efdf1cc8f2edb9c64ecb4f3386ee5

              SHA1

              55f0f699d5127026e73ec751d4489bf966220b6d

              SHA256

              966d0595c6e2690d9aa9c79ce4af94d87f70c5b9960809e7b640b20a27490d69

              SHA512

              b035896792af6d304b485d557c765f6a617e30961f4e5d0996266ca9c323adad531ed3a39720b99520a5037dc935aa0c19d1d18803268d5681e5780a14c04c13

            • C:\Users\Admin\AppData\Roaming\Bearly\Session Storage\CURRENT

              Filesize

              16B

              MD5

              46295cac801e5d4857d09837238a6394

              SHA1

              44e0fa1b517dbf802b18faf0785eeea6ac51594b

              SHA256

              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

              SHA512

              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

            • C:\Users\Admin\AppData\Roaming\Bearly\config.json

              Filesize

              34B

              MD5

              1ffb53e0bcfa1dfde7672728e3114815

              SHA1

              ec46721ab0c27d9e707f63c2ee748c954d775de2

              SHA256

              8e3ed5120a02820b427cb66f4f10c93aa4ca6415f332686b39174a6e04a70c76

              SHA512

              5aaabd51ac0b126c05d881e07fdaf1d82e86f5c6b5aea347ea53ea507fad953409e213ca0ae05bbf0921b478b595fbdbfada1eafd5ec39fbb9454434f0f5d424

            • C:\Users\Admin\AppData\Roaming\Bearly\config.json.tmp-5386381969de684a

              Filesize

              64B

              MD5

              b571feedd7a6cfefa26b73514d57a7c7

              SHA1

              33d4945a08a2040a4707b44d21483cd00858cb7d

              SHA256

              bf7d1e5bafc682ba7bf07389750e4165fa3076e69625630998b4a528f5e6d635

              SHA512

              8d2f594f4f568005005f2ba23bdd67ccdfd4bf56ada577993aaed596c839263f223dc2180897b906d8a8e94fd060eccda97a6cc2f464bd507182db45f4a017c7

            • C:\Users\Admin\AppData\Roaming\Bearly\config.json.tmp-5386382244f8d985

              Filesize

              113B

              MD5

              0c2bb92bc63d59da117b6542b8ca9edb

              SHA1

              1841f159e4e2074fd921877937016a21ff4f0f90

              SHA256

              dc011a83b38ed30c2eb64000cd76d92dd2fa807170fbe2dbab77bc5221471ab3

              SHA512

              8b4f251a74afe73a4c8fa003b5e0d65b33ac642567c73500783f1339e892fe76f3e524d5b56faf0bdff6a799c9581136fe33ac6fc1f135400440ce05abd57e9f

            • C:\Users\Admin\AppData\Roaming\Bearly\config.json.tmp-5386382974954148

              Filesize

              119B

              MD5

              06a780c111c244393ef5753c80af4986

              SHA1

              792ffd61834bae12c91506f70366c55b549a0a3a

              SHA256

              2e125366cdcd62de4bf010b0cac8ef4531f9b785a468c3d75191f93d35f6279c

              SHA512

              7a98c6a729f99e54543e8eb2cabef3b8d7e6f4515caea9c8c1f4280d6cd5386932dfd0c59e4f3aed804d55bdb91187814e3378ed1e4b1cd7f32a7c891c02b740

            • C:\Users\Admin\AppData\Roaming\Bearly\fe6f5ce5-afaa-4620-9023-e6c0aaecc381.tmp

              Filesize

              57B

              MD5

              58127c59cb9e1da127904c341d15372b

              SHA1

              62445484661d8036ce9788baeaba31d204e9a5fc

              SHA256

              be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

              SHA512

              8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • memory/1784-1307-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1305-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1306-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1311-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1314-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1317-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1316-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1315-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1313-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/1784-1312-0x0000024939980000-0x0000024939981000-memory.dmp

              Filesize

              4KB

            • memory/6800-1056-0x00007FFD7B810000-0x00007FFD7B811000-memory.dmp

              Filesize

              4KB

            • memory/6800-1057-0x00007FFD7AE30000-0x00007FFD7AE31000-memory.dmp

              Filesize

              4KB