Overview
overview
7Static
static
3Bandicam/b...up.bat
windows10-1703-x64
7Bandicam/b...up.bat
windows7-x64
7Bandicam/b...up.bat
windows10-2004-x64
7Bandicam/b...up.bat
windows11-21h2-x64
7Bandicam/b...p2.bat
windows10-1703-x64
7Bandicam/b...p2.bat
windows7-x64
7Bandicam/b...p2.bat
windows10-2004-x64
7Bandicam/b...p2.bat
windows11-21h2-x64
7Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
Bandicam/bdcam_setup.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Bandicam/bdcam_setup.bat
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
Bandicam/bdcam_setup.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
Bandicam/bdcam_setup.bat
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
Bandicam/bdcam_setup2.bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Bandicam/bdcam_setup2.bat
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
Bandicam/bdcam_setup2.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Bandicam/bdcam_setup2.bat
Resource
win11-20240611-en
General
-
Target
Bandicam/bdcam_setup2.bat
-
Size
70KB
-
MD5
8a522dec33821148711c857d983651c1
-
SHA1
2641393f1fd63466a4b35ea632b9c177ac3bbbcb
-
SHA256
fd83c925242c80089404bda5cbeee012ed4592c9fdd9dceba2d0ed43dad451d4
-
SHA512
d14f57f949f1a519966a3bfba27d79aa34c32474e573031f35eee8a743d971cb771c8e7c8f82de094e47bc7c08744c5f3eb5e082e809149efc0accfbc4786261
-
SSDEEP
1536:Adgu9vQizEgn0/6xwWhyYS2LEkTBR+MSD9dCr:ADzEowWhyeQIR+MMur
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3868 bdcam_activate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2544 bdcam.exe 2544 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\DefaultIcon bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\Shell\Open\Command bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\Shell bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\Shell\Open bdcam.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.bfix bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.bfix\ = "BANDICAM.bfix" bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\ = "BandiFix Recovery File" bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Bandicam\\bdfix.exe" bdcam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\BANDICAM.bfix\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bandicam\\bdfix.exe\"\"%1\"" bdcam.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2544 bdcam.exe 2544 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4492 AUDIODG.EXE Token: 33 1272 bdcam.exe Token: SeIncBasePriorityPrivilege 1272 bdcam.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1272 bdcam.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1272 bdcam.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2544 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe 1272 bdcam.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3640 4692 cmd.exe 91 PID 4692 wrote to memory of 3640 4692 cmd.exe 91 PID 3640 wrote to memory of 4052 3640 net.exe 92 PID 3640 wrote to memory of 4052 3640 net.exe 92 PID 4692 wrote to memory of 2544 4692 cmd.exe 93 PID 4692 wrote to memory of 2544 4692 cmd.exe 93 PID 2544 wrote to memory of 5088 2544 bdcam.exe 94 PID 2544 wrote to memory of 5088 2544 bdcam.exe 94 PID 2544 wrote to memory of 1012 2544 bdcam.exe 95 PID 2544 wrote to memory of 1012 2544 bdcam.exe 95 PID 2544 wrote to memory of 1012 2544 bdcam.exe 95 PID 4692 wrote to memory of 3100 4692 cmd.exe 96 PID 4692 wrote to memory of 3100 4692 cmd.exe 96 PID 4692 wrote to memory of 3868 4692 cmd.exe 98 PID 4692 wrote to memory of 3868 4692 cmd.exe 98 PID 4692 wrote to memory of 3868 4692 cmd.exe 98 PID 4692 wrote to memory of 3172 4692 cmd.exe 99 PID 4692 wrote to memory of 3172 4692 cmd.exe 99 PID 4692 wrote to memory of 1272 4692 cmd.exe 100 PID 4692 wrote to memory of 1272 4692 cmd.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam_setup2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\net.exeNET SESSION2⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 SESSION3⤵PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam.exe"bdcam.exe" /install2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcamvk64.dll",RegDll3⤵PID:5088
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcamvk32.dll",RegDll3⤵PID:1012
-
-
-
C:\Windows\system32\certutil.execertutil -decode C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam_setup2.bat "C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe"2⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe"C:\Users\Admin\AppData\Local\Temp\bdcam_activate.exe" /inst2⤵
- Executes dropped EXE
PID:3868
-
-
C:\Windows\system32\reg.exereg copy "HKLM\SOFTWARE\WOW6432Node\BANDISOFT\BANDICAM\OPTION" "HKCU\SOFTWARE\BANDISOFT\BANDICAM\OPTION" /s /f2⤵PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\Bandicam\bdcam.exe"bdcam.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1020,i,3724086843943218842,1026644135694712596,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:81⤵PID:1624
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5e8798824bbbeb49465ed12f37f2d9f4a
SHA163727c3524b0fd56c977cc5e1918c740714c1ead
SHA256e3b24f1c668598adc610c010a4fb43e4e3d370c2e63cd4f7130936e761d7db78
SHA512fddb433caa0441b9facfa9cc4e396584fd4b7f2cf3e8953fc7ad667842320588d32cbd334e8f88578c1f5e925ecb4a9cb97b01b5e9118d3fc50e8f2cf4f3841b
-
Filesize
88B
MD57e6424083dd8154651fa316761326deb
SHA172f4886fe199a64e33719c1268aa7f7ca45f391c
SHA256719f5377e869580dd65bad8bc74c3209ab503fce8b2685fb3dad58a3405cd1da
SHA512384cb33925235892d18656f46056a6a24c7be86ab2c35caa6c650c942cc37c40b69175d6b8aba0742bb98e85fb5460a22a904105e22f4e265e1f42202d1b64de