Overview
overview
10Static
static
10BPLogger-main.zip
windows7-x64
1BPLogger-main.zip
windows10-2004-x64
1BPLogger-m...er.rar
windows7-x64
10BPLogger-m...er.rar
windows10-2004-x64
10BPLogger.exe
windows7-x64
10BPLogger.exe
windows10-2004-x64
10tapi.dll
windows7-x64
1tapi.dll
windows10-2004-x64
1x64.dll
windows7-x64
3x64.dll
windows10-2004-x64
3BPLogger-m...DME.md
windows7-x64
3BPLogger-m...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 04:24
Behavioral task
behavioral1
Sample
BPLogger-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BPLogger-main.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
BPLogger-main/BPLogger.rar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BPLogger-main/BPLogger.rar
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
BPLogger.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
BPLogger.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
tapi.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
tapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
x64.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
BPLogger-main/README.md
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
BPLogger-main/README.md
Resource
win10v2004-20250129-en
General
-
Target
BPLogger-main/README.md
-
Size
833B
-
MD5
3b5e5e67f9bc945473630a9b2d7ac214
-
SHA1
d287db38e281bf68110ab665b54949fe031ce2f0
-
SHA256
0385a343adfe1facbce68d71ab59274e7dfcc8d69d180b1c3b64b10db29f1b4f
-
SHA512
3ecab2afebfd497f85ca98220f4173fb85a3bd0c1bd0a4d3982438af071a952e557f70177b88038b792486db03814e4025ef83c24b45c416504d20666caf627b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 AcroRd32.exe 2752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2220 2256 cmd.exe 31 PID 2256 wrote to memory of 2220 2256 cmd.exe 31 PID 2256 wrote to memory of 2220 2256 cmd.exe 31 PID 2220 wrote to memory of 2752 2220 rundll32.exe 33 PID 2220 wrote to memory of 2752 2220 rundll32.exe 33 PID 2220 wrote to memory of 2752 2220 rundll32.exe 33 PID 2220 wrote to memory of 2752 2220 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BPLogger-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BPLogger-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BPLogger-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c24c86ecc1f6bd7adb6d1565b37003cd
SHA19c002c378926b2f2f8ee4a8b3d366c036f9be920
SHA2566e64ad6c79f0048d6a645c06c211d037c880eab95b2729239ecf0bdb87a30708
SHA5128c76956eeb453a2eb56de1b970cf240ab4f42d8b5bc91b8f7a17e09707e8c4e9c987d65d48b64ca9db4fdf2c2539aa63e6128247532c356b3cbd06cc62e0147a