Overview
overview
5Static
static
3BDCAMSETUP...85.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/D3...47.dll
windows10-2004-x64
3$SYSDIR/vcomp140.dll
windows10-2004-x64
3$TEMP/BDMP...UP.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$SYSDIR/bdmjpeg.dll
windows10-2004-x64
3$SYSDIR/bdmjpeg64.dll
windows10-2004-x64
1$SYSDIR/bdmpega.dll
windows10-2004-x64
3$SYSDIR/bdmpega64.dll
windows10-2004-x64
1$SYSDIR/bdmpegv.dll
windows10-2004-x64
3RegVulkanLayer.bat
windows10-2004-x64
3UnregVulkanLayer.bat
windows10-2004-x64
3amf-compon...32.dll
windows10-2004-x64
3amf-compon...64.dll
windows10-2004-x64
1amf-core-w...32.dll
windows10-2004-x64
3amf-core-w...64.dll
windows10-2004-x64
1bdcam.dll
windows10-2004-x64
3bdcam.exe
windows10-2004-x64
5bdcam64.exe
windows10-2004-x64
1bdcam64.dll
windows10-2004-x64
1bdcam_nonadmin.exe
windows10-2004-x64
5bdcamih.dll
windows10-2004-x64
3bdcamvk32.dll
windows10-2004-x64
3bdcamvk64.dll
windows10-2004-x64
1bdcap32.dll
windows10-2004-x64
3bdcap64.dll
windows10-2004-x64
1bdfix.exe
windows10-2004-x64
5lang/Japanese.ps1
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
BDCAMSETUP_ENG_4_1_2_1385.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
$SYSDIR/D3DCompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$SYSDIR/vcomp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
$TEMP/BDMPEG1SETUP.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
$SYSDIR/bdmjpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$SYSDIR/bdmjpeg64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
$SYSDIR/bdmpega.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$SYSDIR/bdmpega64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
$SYSDIR/bdmpegv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
RegVulkanLayer.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
UnregVulkanLayer.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
amf-component-vce-windesktop32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
amf-component-vce-windesktop64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
amf-core-windesktop32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
amf-core-windesktop64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
bdcam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
bdcam.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
bdcam64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
bdcam64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
bdcam_nonadmin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
bdcamih.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
bdcamvk32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
bdcamvk64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
bdcap32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
bdcap64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
bdfix.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
lang/Japanese.ps1
Resource
win10v2004-20241007-en
General
-
Target
bdcam_nonadmin.exe
-
Size
150KB
-
MD5
cfd060be6ccb4859edf73a91db415cf3
-
SHA1
70049f6e03e16d394a0d5325e2ec5816ab5713b9
-
SHA256
262825b33825dc29076036e9111eabcaa5a981bfae4be0c0ad9f6760101f1a3a
-
SHA512
23e227137781c220d60d4bc595e25d6df7c7c325a896d3ef0eaffdc96549726dbacba345588de1f4230e98ece4377439a56b7e2f5a8c59a3399c284b48aa2d62
-
SSDEEP
3072:czbsh7wXQA35X2PXiV5rpezDw2VBKJ4KrUX3kb1hVeVh0:czb26QoXMraUn4R
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bdcam_nonadmin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3792 bdcam.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3608 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdcam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdcam_nonadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3792 bdcam.exe 3792 bdcam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3792 bdcam.exe 3792 bdcam.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3608 3096 bdcam_nonadmin.exe 84 PID 3096 wrote to memory of 3608 3096 bdcam_nonadmin.exe 84 PID 3096 wrote to memory of 3608 3096 bdcam_nonadmin.exe 84 PID 3608 wrote to memory of 3792 3608 cmd.exe 86 PID 3608 wrote to memory of 3792 3608 cmd.exe 86 PID 3608 wrote to memory of 3792 3608 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdcam_nonadmin.exe"C:\Users\Admin\AppData\Local\Temp\bdcam_nonadmin.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /min /c "set __COMPAT_LAYER=RUNASINVOKER && start "" "C:\Users\Admin\AppData\Local\Temp\bdcam.exe" /from_nonadmin "2⤵
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\bdcam.exe"C:\Users\Admin\AppData\Local\Temp\bdcam.exe" /from_nonadmin3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3792
-
-