Overview
overview
10Static
static
7Bandicam 7...m].rar
windows11-21h2-x64
10Bandicam 7...up.exe
windows11-21h2-x64
9$PLUGINSDI...al.ini
windows11-21h2-x64
3$PLUGINSDI...er.bmp
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows11-21h2-x64
3bandicam.ini
windows11-21h2-x64
3bdcamvk32.json
windows11-21h2-x64
3bdcamvk64.json
windows11-21h2-x64
3data/camera.wav
windows11-21h2-x64
6data/effec...10.dat
windows11-21h2-x64
3data/effec...15.dat
windows11-21h2-x64
3data/effec...20.dat
windows11-21h2-x64
3data/effec...30.dat
windows11-21h2-x64
3data/effec...10.dat
windows11-21h2-x64
3data/effec...15.dat
windows11-21h2-x64
3data/effec...20.dat
windows11-21h2-x64
3data/effec...30.dat
windows11-21h2-x64
3data/language.dat
windows11-21h2-x64
3data/langu...ix.dat
windows11-21h2-x64
3data/lclick.wav
windows11-21h2-x64
6data/rclick.wav
windows11-21h2-x64
6data/sample.png
windows11-21h2-x64
3data/skin.zip
windows11-21h2-x64
1data/start.wav
windows11-21h2-x64
6data/stop.wav
windows11-21h2-x64
6encap64.dll
windows11-21h2-x64
1lang/Japanese.ps1
windows11-21h2-x64
3Bandicam 7...eg.rar
windows11-21h2-x64
1Visit www....om.url
windows11-21h2-x64
1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-10-2024 17:56
Behavioral task
behavioral1
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com].rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com]/bdcamsetup.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
bandicam.ini
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
bdcamvk32.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
bdcamvk64.json
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
data/camera.wav
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
data/effects/effects10.dat
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
data/effects/effects15.dat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
data/effects/effects20.dat
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
data/effects/effects30.dat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
data/effects/highlight10.dat
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
data/effects/highlight15.dat
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
data/effects/highlight20.dat
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
data/effects/highlight30.dat
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
data/language.dat
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
data/language_bdfix.dat
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
data/lclick.wav
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
data/rclick.wav
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
data/sample.png
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
data/skin.zip
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
data/start.wav
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
data/stop.wav
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
encap64.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
lang/Japanese.ps1
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Bandicam 7.1.4.2458 (x64) Multilingual [pesktop.com]/reg.rar
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Visit www.pesktop.com.url
Resource
win11-20241007-en
General
-
Target
data/rclick.wav
-
Size
68KB
-
MD5
302e0e3b92e3443f60bdbad8d59efed3
-
SHA1
cf317e9f9d6973efe590525525994ea6bc87563a
-
SHA256
81cad36978281837c3ba3abc26d782fe51591ea923bf31fbf3130ff86cd5f752
-
SHA512
5a0a5f11f1726a09dec53933a032e28506539a99c55e34aac6d93ace1c8f19c7566268ce4e8483f54ba99287305455ec1ddbcf56ae53a5a3f5140f834f637e13
-
SSDEEP
384:q7hENDwWwlwsQ11S/iRLvXccDVmvYFziHJHfnrgFGA5Ukzrn99MX/fHEos5:00Pz5HzHlQvroGAqM99+12
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1537126222-899333903-2037027349-1000\{530FC2B7-C95B-4EB9-A8A8-FDC4F7CA38A8} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3712 wmplayer.exe Token: SeCreatePagefilePrivilege 3712 wmplayer.exe Token: SeShutdownPrivilege 4392 unregmp2.exe Token: SeCreatePagefilePrivilege 4392 unregmp2.exe Token: 33 1992 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1992 AUDIODG.EXE Token: SeShutdownPrivilege 3712 wmplayer.exe Token: SeCreatePagefilePrivilege 3712 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3712 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4476 3712 wmplayer.exe 77 PID 3712 wrote to memory of 4476 3712 wmplayer.exe 77 PID 3712 wrote to memory of 4476 3712 wmplayer.exe 77 PID 4476 wrote to memory of 4392 4476 unregmp2.exe 78 PID 4476 wrote to memory of 4392 4476 unregmp2.exe 78
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\data\rclick.wav"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3404
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004B81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD568392c7031e89640fbbc668da8b91177
SHA15720873e12e15dd10ab09003cb9fdc7e800aab46
SHA2565f7af12b6da3f9fd3019a681a873bad0ee4c0db1723e1f006c99294f62814d45
SHA5122af55c621f9cafcefb24681c67acf308eaadf6f3f43fe96b166372881725360e4bc83da49fd1ebf496cd4a057c7c1d3d8fb9f11afca8134306c33ab0d9890512
-
Filesize
1024KB
MD50e86d2d4c7be79d4dfb95916e1ae0780
SHA14bb9a40e49bd5960cbd03f7e3ab1df4b73869ebd
SHA2566f5b703f3c3fea94576c8e70b80ac60e3b63353617dde93cc4fbae008020431e
SHA512dc057fdcbec4ca52b375c76a577d95191c9452fca32745aedf8191211a943db29d7a2b75d63c84e8fa43ced9953a04df6615cd3e122038c36b9e49125fcbb387
-
Filesize
68KB
MD558c18af18603f66bc905986da570c705
SHA1720347cc3dd1b4c5e66b96c368e426b1af06293d
SHA256cdbc9fb6c61223381c0d791fb6bd25a3f323ff75a6f4756e524b099a63c483f8
SHA5125ef97c101a6893166f8e95c03ccbf6ec1eb8956b1492192c3604c150b5693b09c08b73a1c10ef173d12f1cbd54ac9b15a34d27acbd68d8c13e0a7b46f68d7f18
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5d0ab041f7409db29eb3908155a84f80b
SHA16943fb39dd903f306b83738857ac069d680bed54
SHA2567130a7c2b142a13cd541fe356cfd8cc47b2c8bebb035221f5f4438b4186c9c7d
SHA51237f60af2f5c57520e5804c57fa121f55d31b6b6bbc2626c30eb4271bd7b2267ce4bae65d6fe0c4e488e38aad610b9a80b62775d4e8b0325f419477978ea85971