Overview
overview
7Static
static
3Bandicam/b...up.bat
windows10-1703-x64
7Bandicam/b...up.bat
windows7-x64
7Bandicam/b...up.bat
windows10-2004-x64
7Bandicam/b...up.bat
windows11-21h2-x64
7Bandicam/b...p2.bat
windows10-1703-x64
7Bandicam/b...p2.bat
windows7-x64
7Bandicam/b...p2.bat
windows10-2004-x64
7Bandicam/b...p2.bat
windows11-21h2-x64
7Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-06-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
Bandicam/bdcam_setup.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Bandicam/bdcam_setup.bat
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
Bandicam/bdcam_setup.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
Bandicam/bdcam_setup.bat
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
Bandicam/bdcam_setup2.bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Bandicam/bdcam_setup2.bat
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
Bandicam/bdcam_setup2.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Bandicam/bdcam_setup2.bat
Resource
win11-20240611-en
General
-
Target
Bandicam/bdcam_setup2.bat
-
Size
70KB
-
MD5
8a522dec33821148711c857d983651c1
-
SHA1
2641393f1fd63466a4b35ea632b9c177ac3bbbcb
-
SHA256
fd83c925242c80089404bda5cbeee012ed4592c9fdd9dceba2d0ed43dad451d4
-
SHA512
d14f57f949f1a519966a3bfba27d79aa34c32474e573031f35eee8a743d971cb771c8e7c8f82de094e47bc7c08744c5f3eb5e082e809149efc0accfbc4786261
-
SSDEEP
1536:Adgu9vQizEgn0/6xwWhyYS2LEkTBR+MSD9dCr:ADzEowWhyeQIR+MMur
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 bdcam_activate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1276 bdcam.exe 1276 bdcam.exe 192 bdcam.exe 192 bdcam.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Bandicam\\bdfix.exe" bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\Shell\Open\Command bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\Shell\Open bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\.bfix bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\ = "BandiFix Recovery File" bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bandicam\\bdfix.exe\"\"%1\"" bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\.bfix\ = "BANDICAM.bfix" bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\DefaultIcon bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\BANDICAM.bfix\Shell bdcam.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1276 bdcam.exe 1276 bdcam.exe 192 bdcam.exe 192 bdcam.exe 192 bdcam.exe 192 bdcam.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 604 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 604 AUDIODG.EXE Token: 33 192 bdcam.exe Token: SeIncBasePriorityPrivilege 192 bdcam.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 192 bdcam.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 192 bdcam.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1276 bdcam.exe 192 bdcam.exe 192 bdcam.exe 192 bdcam.exe 192 bdcam.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4936 2564 cmd.exe 74 PID 2564 wrote to memory of 4936 2564 cmd.exe 74 PID 4936 wrote to memory of 3032 4936 net.exe 75 PID 4936 wrote to memory of 3032 4936 net.exe 75 PID 2564 wrote to memory of 1276 2564 cmd.exe 76 PID 2564 wrote to memory of 1276 2564 cmd.exe 76 PID 1276 wrote to memory of 4644 1276 bdcam.exe 77 PID 1276 wrote to memory of 4644 1276 bdcam.exe 77 PID 1276 wrote to memory of 1248 1276 bdcam.exe 78 PID 1276 wrote to memory of 1248 1276 bdcam.exe 78 PID 1276 wrote to memory of 1248 1276 bdcam.exe 78 PID 2564 wrote to memory of 3680 2564 cmd.exe 79 PID 2564 wrote to memory of 3680 2564 cmd.exe 79 PID 2564 wrote to memory of 2004 2564 cmd.exe 80 PID 2564 wrote to memory of 2004 2564 cmd.exe 80 PID 2564 wrote to memory of 2004 2564 cmd.exe 80 PID 2564 wrote to memory of 168 2564 cmd.exe 81 PID 2564 wrote to memory of 168 2564 cmd.exe 81 PID 2564 wrote to memory of 192 2564 cmd.exe 83 PID 2564 wrote to memory of 192 2564 cmd.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam_setup2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\net.exeNET SESSION2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 SESSION3⤵PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam.exe"bdcam.exe" /install2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcamvk64.dll",RegDll3⤵PID:4644
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcamvk32.dll",RegDll3⤵PID:1248
-
-
-
C:\Windows\system32\certutil.execertutil -decode C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam_setup2.bat "C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe"2⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe"C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe" /inst2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SOFTWARE\WOW6432Node\BANDISOFT\BANDICAM\OPTION" "HKCU\SOFTWARE\BANDISOFT\BANDICAM\OPTION" /s /f2⤵PID:168
-
-
C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam.exe"bdcam.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:192
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5e8798824bbbeb49465ed12f37f2d9f4a
SHA163727c3524b0fd56c977cc5e1918c740714c1ead
SHA256e3b24f1c668598adc610c010a4fb43e4e3d370c2e63cd4f7130936e761d7db78
SHA512fddb433caa0441b9facfa9cc4e396584fd4b7f2cf3e8953fc7ad667842320588d32cbd334e8f88578c1f5e925ecb4a9cb97b01b5e9118d3fc50e8f2cf4f3841b