Overview
overview
10Static
static
7Bandicam 7...m].rar
windows11-21h2-x64
10Bandicam 7...up.exe
windows11-21h2-x64
9$PLUGINSDI...al.ini
windows11-21h2-x64
3$PLUGINSDI...er.bmp
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows11-21h2-x64
3bandicam.ini
windows11-21h2-x64
3bdcamvk32.json
windows11-21h2-x64
3bdcamvk64.json
windows11-21h2-x64
3data/camera.wav
windows11-21h2-x64
6data/effec...10.dat
windows11-21h2-x64
3data/effec...15.dat
windows11-21h2-x64
3data/effec...20.dat
windows11-21h2-x64
3data/effec...30.dat
windows11-21h2-x64
3data/effec...10.dat
windows11-21h2-x64
3data/effec...15.dat
windows11-21h2-x64
3data/effec...20.dat
windows11-21h2-x64
3data/effec...30.dat
windows11-21h2-x64
3data/language.dat
windows11-21h2-x64
3data/langu...ix.dat
windows11-21h2-x64
3data/lclick.wav
windows11-21h2-x64
6data/rclick.wav
windows11-21h2-x64
6data/sample.png
windows11-21h2-x64
3data/skin.zip
windows11-21h2-x64
1data/start.wav
windows11-21h2-x64
6data/stop.wav
windows11-21h2-x64
6encap64.dll
windows11-21h2-x64
1lang/Japanese.ps1
windows11-21h2-x64
3Bandicam 7...eg.rar
windows11-21h2-x64
1Visit www....om.url
windows11-21h2-x64
1Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-10-2024 17:56
Behavioral task
behavioral1
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com].rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com]/bdcamsetup.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
bandicam.ini
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
bdcamvk32.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
bdcamvk64.json
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
data/camera.wav
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
data/effects/effects10.dat
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
data/effects/effects15.dat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
data/effects/effects20.dat
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
data/effects/effects30.dat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
data/effects/highlight10.dat
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
data/effects/highlight15.dat
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
data/effects/highlight20.dat
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
data/effects/highlight30.dat
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
data/language.dat
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
data/language_bdfix.dat
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
data/lclick.wav
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
data/rclick.wav
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
data/sample.png
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
data/skin.zip
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
data/start.wav
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
data/stop.wav
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
encap64.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
lang/Japanese.ps1
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com]/reg.rar
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Visit www.pesktop.com.url
Resource
win11-20241007-en
General
-
Target
data/lclick.wav
-
Size
69KB
-
MD5
edc287a54e68f13033dd06a688574cde
-
SHA1
4d20d2d093de6d0b3a2521bfbe2d29afd8b16dcc
-
SHA256
5c03d7d2366592d9e35264b957131ddea2676fe505680de70f5e0878f70ce0c5
-
SHA512
0fafd1e1041d89362bc66b1fcc07ed7b16db578d2b531fd6093c4eb267438db78d26bf5b5a2f5f102137d4935957215ac00451915a200cbf82c5ef5a8aaca2a4
-
SSDEEP
768:8ElMjPf1wNlVLYEtn316Lq1uu7ZptHB0kxOC7wTze6P7aBOBejLI:vUeNlH/6OMap16kxwTze6P7Q8ejLI
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3587106988-279496464-3440778474-1000\{50CE72CA-7645-43D5-86A3-E53BA9F82DD0} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4852 wmplayer.exe Token: SeCreatePagefilePrivilege 4852 wmplayer.exe Token: SeShutdownPrivilege 2700 unregmp2.exe Token: SeCreatePagefilePrivilege 2700 unregmp2.exe Token: 33 4708 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4708 AUDIODG.EXE Token: SeShutdownPrivilege 4852 wmplayer.exe Token: SeCreatePagefilePrivilege 4852 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4852 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4460 4852 wmplayer.exe 77 PID 4852 wrote to memory of 4460 4852 wmplayer.exe 77 PID 4852 wrote to memory of 4460 4852 wmplayer.exe 77 PID 4460 wrote to memory of 2700 4460 unregmp2.exe 78 PID 4460 wrote to memory of 2700 4460 unregmp2.exe 78
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\data\lclick.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2652
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD51a0295014678e91e7fea0a79074d6ffc
SHA1f93a33dfd19a09d92174a17f0912440ddb1479a0
SHA256fba2e401545352472136e5c71b0596b9125ddcfe2b87c439d8567cb2dad16745
SHA512d7aec99cf127bf009bad534f293b65ce93ed08c650312a32ea670b0cf09dcaa0906962d9b29ce6c078396885e8ce55bf5ae5598c2480fd508ebddd111bd6c882
-
Filesize
1024KB
MD5b16bb521c10f4504b3ba55883a305a06
SHA183b4492c4aa33b345c6aa252c117fe4a71455d40
SHA2562de509f4df010e9fd322df0101ac1dac22b8364022274102f8bb0c06b949ee13
SHA512dcec4edb648c3c6dc98b1b2e713c835c0d5f00bed20b5a21a8cb5993cb37bf3dbce7a55bf77cd2b88c1854e0867362cfc8ff1320813656eecb4d83a78d611dd7
-
Filesize
68KB
MD52c731e97dbb3e1c69b0c0de0c262ef3e
SHA1d158017e0175dcb234eca939206cb30adeab3655
SHA25690786f2c9d6034cc93795e6ee319a025995a876fa3558409bb5135521aabf646
SHA5120810b471448ac4f1e3d97e7d3ac9b506c1c7dc6f0313d492688c8745e9661e92ae29e0d3d574f3dac0a972f96dc67c2ac8fcd8577499329b66bc717972d60c93
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD58cd97980b6d7cf66ebe6522984362f57
SHA1e8cb99df313026c1da24a2dc0e8477ef266ebdab
SHA2566ba24de3650342e6fd085ddf464131ee9b88360316f3dfa5b652b89fc16d086d
SHA5129deeeb10e0c37242c4da32fd9e21a6538531458620967a55965ba2ff9d2340ab340d788d09ed4f3dde2328d9268c361930176e84172b5d018658ea52ae24f454