Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 17:58

General

  • Target

    Beaker Browser.exe

  • Size

    67.8MB

  • MD5

    a79d31e8a93a6d2e5efbba69fd9c647e

  • SHA1

    37da53b97478f8ab8af3bed446dcf01e265602d9

  • SHA256

    4e6bc9ca74561f98769257e2a1ebffb985a0c48b506d8cbbf995886ba8886d0f

  • SHA512

    104d332f3d503903ac17e9c7f6f234bcb9dbd07c2f6137874c1cbe4a16e1b7d32ffbb37cf324abb52286509bbb44950a45c4643d61bcc541eb3e1d7eda4ac766

  • SSDEEP

    393216:e18D8SMWJfEJNT1VPHuXb6B4u5wgq439gFvYqehzxmtj5iKGMlQrrNOtXGTi7zR+:0HOlYSjSjjBpmD2EqZPEytx

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
    "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\System32\Wbem\wmic.exe
      wmic os get locale
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3560
    • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
      "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=gpu-process --enable-features=FixAltGraph --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=A3250542140C8BE15D934818870FD6FA --mojo-platform-channel-handle=1500 --ignored=" --type=renderer " /prefetch:2
      2⤵
        PID:2060
      • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
        "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=renderer --enable-features=FixAltGraph --service-pipe-token=20C2AED025F8F5D114EC99FA19BDA52E --lang=en-US --standard-schemes=dat,beaker,beaker-hidden-window --secure-schemes=dat,beaker,beaker-hidden-window --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#fff --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=20C2AED025F8F5D114EC99FA19BDA52E --renderer-client-id=4 --mojo-platform-channel-handle=2108 /prefetch:1
        2⤵
          PID:2900
        • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
          "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=gpu-process --enable-features=FixAltGraph --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=6926B5031A26EE87DE3185B4544BF7AF --mojo-platform-channel-handle=2356 --ignored=" --type=renderer " /prefetch:2
          2⤵
            PID:4064
          • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
            "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=renderer --enable-features=FixAltGraph --disable-gpu-compositing --service-pipe-token=3A470E4BDA87D75E3BC069CE07440D58 --lang=en-US --standard-schemes=dat,beaker,beaker-hidden-window --secure-schemes=dat,beaker,beaker-hidden-window --register-service-worker-schemes=dat --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --enable-sandbox --native-window-open --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\shell-window.build.js" --background-color=#ddd --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=3A470E4BDA87D75E3BC069CE07440D58 --renderer-client-id=7 --mojo-platform-channel-handle=2160 /prefetch:1
            2⤵
            • Checks computer location settings
            PID:1504
          • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
            "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=renderer --enable-features=FixAltGraph --disable-gpu-compositing --service-pipe-token=68D52DFF38264BBFB804BF9F8E64CD7F --lang=en-US --standard-schemes=dat,beaker,beaker-hidden-window --secure-schemes=dat,beaker,beaker-hidden-window --register-service-worker-schemes=dat --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=false --webview-tag=true --enable-sandbox --native-window-open --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\webview-preload.build.js" --background-color=#fff --guest-instance-id=1 --enable-blink-features --disable-blink-features --hidden-page --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=68D52DFF38264BBFB804BF9F8E64CD7F --renderer-client-id=8 --mojo-platform-channel-handle=2604 /prefetch:1
            2⤵
            • Checks computer location settings
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe
            "C:\Users\Admin\AppData\Local\Temp\Beaker Browser.exe" --type=renderer --enable-features=FixAltGraph --disable-gpu-compositing --service-pipe-token=E3D06574DC784E9FE2427E903B7864B8 --lang=en-US --standard-schemes=dat,beaker,beaker-hidden-window --secure-schemes=dat,beaker,beaker-hidden-window --register-service-worker-schemes=dat --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=false --webview-tag=true --enable-sandbox --native-window-open --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\webview-preload.build.js" --background-color=#fff --guest-instance-id=1 --enable-blink-features --disable-blink-features --hidden-page --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=E3D06574DC784E9FE2427E903B7864B8 --renderer-client-id=9 --mojo-platform-channel-handle=2584 /prefetch:1
            2⤵
            • Checks computer location settings
            PID:4960
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:2184

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2a5710db-9b58-46c6-b8fa-1f2312e6f8aa.tmp.node

            Filesize

            483KB

            MD5

            49c8147e24e495a73f6644235e1367f1

            SHA1

            a7a44c431aed3db65133c62af097567fa202348f

            SHA256

            e74a7aba6b9b907af16140b23417067685364f5703ef9e6d866cecb17ba5df02

            SHA512

            967689af160680fa39a1135ad5dfa9ccebafbb5431d83502a24a1c216fa47eca941f9a18f491334fd8439e184753d30293559370370fd4a009f6a260186ea2e7

          • C:\Users\Admin\AppData\Local\Temp\2a9ab686-3f62-41d1-9459-369a52fdbaab.tmp.node

            Filesize

            1.2MB

            MD5

            749dd8266b93415b162f6c14926c62af

            SHA1

            54515ccf7e99e65bf46a15d41560c9abb29e76c8

            SHA256

            3291be88bd810eb662183264854d71e18c1672e1eac97c9788d1cf20864d3c5f

            SHA512

            e8e428016665ccf6fe2807d16bca42bbb176f32c47a94e7b95ee413294a3f5b23b1e96d5b387591f17614ac29462ae2a09dd86f3d51c186a25a867a78d69fad6

          • C:\Users\Admin\AppData\Local\Temp\4957c6d6-7607-4076-8ee9-a6a284b696dd.tmp.node

            Filesize

            199KB

            MD5

            d8fe84b018d92e8f4043be038dd64d33

            SHA1

            54a64366c2cd1b45b344930474db9712d8a89011

            SHA256

            853b30ec29e360a06038720c5526b05f9f4fee6a8e9e7b0ed12cdb86054f42c1

            SHA512

            7deb35043319bd0a09fd8acf3cd627ad6ee4e7a01104da10445aba91305c772a7cbef22c37e077f8044a15c60913ab23d8cac8560a1c8cbf72957f11d99f1302

          • memory/1504-149-0x00007FFCE6B20000-0x00007FFCE6B21000-memory.dmp

            Filesize

            4KB

          • memory/1504-191-0x00000274ECAC0000-0x00000274ECB15000-memory.dmp

            Filesize

            340KB

          • memory/1504-192-0x00000274ECB20000-0x00000274ECBED000-memory.dmp

            Filesize

            820KB

          • memory/1504-152-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/1504-148-0x00007FFCE6B10000-0x00007FFCE6B11000-memory.dmp

            Filesize

            4KB

          • memory/2060-16-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/2060-23-0x000002329F100000-0x000002329F155000-memory.dmp

            Filesize

            340KB

          • memory/2060-15-0x00007FFCE7590000-0x00007FFCE7591000-memory.dmp

            Filesize

            4KB

          • memory/2840-0-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/2900-22-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/3156-169-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/3156-182-0x000001C3B82A0000-0x000001C3B82F5000-memory.dmp

            Filesize

            340KB

          • memory/3156-183-0x000001C3B84D0000-0x000001C3B859D000-memory.dmp

            Filesize

            820KB

          • memory/4064-29-0x00000209ACD70000-0x00000209ACDC5000-memory.dmp

            Filesize

            340KB

          • memory/4064-27-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/4960-172-0x00007FF621440000-0x00007FF625889000-memory.dmp

            Filesize

            68.3MB

          • memory/4960-194-0x0000022FA7790000-0x0000022FA785D000-memory.dmp

            Filesize

            820KB

          • memory/4960-193-0x0000022FA7730000-0x0000022FA7785000-memory.dmp

            Filesize

            340KB