File name:

bfsvc.exe

Full analysis: https://app.any.run/tasks/65a1f406-a6f5-47a7-b3b9-a012077fbe1e
Verdict: Malicious activity
Analysis date: January 18, 2024, 22:36:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
remote
sparkrat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7C5E42006469D4200ACA55BB28871D23

SHA1:

CA963BE1ED6911EB05F3875D7658E2488083293B

SHA256:

ACE21809EBCD47A8ECD9C048B78279FBAA7D2118A3DDE7E44C77FD4C425D1B83

SSDEEP:

98304:/Krko2LEEX1u4OyZhoeC9B5/TSd1qdvuSZ+jT4MiRHAVIZK3i3aj9UF6YHnyjHam:/Pmlg28zGFjUsE2e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • bfsvc.exe (PID: 116)
    • Connects to the CnC server

      • bfsvc.exe (PID: 1432)
    • SPARKRAT has been detected (SURICATA)

      • bfsvc.exe (PID: 1432)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • bfsvc.exe (PID: 1432)
    • Connects to unusual port

      • bfsvc.exe (PID: 1432)
  • INFO

    • Reads the computer name

      • bfsvc.exe (PID: 116)
      • bfsvc.exe (PID: 1432)
    • Checks supported languages

      • bfsvc.exe (PID: 116)
      • bfsvc.exe (PID: 1432)
    • Manual execution by a user

      • bfsvc.exe (PID: 1432)
    • Checks operating system version

      • bfsvc.exe (PID: 1432)
    • Reads the machine GUID from the registry

      • bfsvc.exe (PID: 1432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.3)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:18 23:33:25+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 1.73
CodeSize: 8070656
InitializedDataSize: 512
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bfsvc.exe no specs #SPARKRAT bfsvc.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Local\Temp\bfsvc.exe" C:\Users\admin\AppData\Local\Temp\bfsvc.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1432"C:\Users\admin\AppData\Local\Temp\bfsvc.exe" C:\Users\admin\AppData\Local\Temp\bfsvc.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\bfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
2204cmd verC:\Windows\System32\cmd.exebfsvc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 043
Read events
1 043
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
1
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1432
bfsvc.exe
GET
101
185.196.10.224:8000
http://web3standard.duckdns.org:8000/ws
unknown
1432
bfsvc.exe
POST
200
185.196.10.224:8000
http://web3standard.duckdns.org:8000/api/client/update?arch=386&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
unknown
binary
10 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1432
bfsvc.exe
185.196.10.224:8000
web3standard.duckdns.org
Simple Carrier LLC
US
unknown

DNS requests

Domain
IP
Reputation
web3standard.duckdns.org
  • 185.196.10.224
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Websocket update request to external network
Malware Command and Control Activity Detected
ET MALWARE Win32/SparkRAT CnC Checkin (GET)
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
Potentially Bad Traffic
ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain
Potentially Bad Traffic
ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain
Potentially Bad Traffic
ET INFO HTTP POST Request to DuckDNS Domain
1 ETPRO signatures available at the full report
No debug info