Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 18:25

General

  • Target

    $8/ClownfishVoiceChanger.exe

  • Size

    805KB

  • MD5

    208c37506cddf0613517488da3287d12

  • SHA1

    99b918443e424af947ed10aa84fa242af70ca856

  • SHA256

    d29a8c5ad1704c7fbe0e24fadf4a8a1dabe441c84f9dfe4359755cc76c148a61

  • SHA512

    0318dd9ecf5d41504f60fc0f71ac306cafbfb75808c7597a2ab3b745a487d042371fe5c159e42f0a431a29820e4e164e43e78673eb12124b9304adebdf5e2f65

  • SSDEEP

    12288:ddCn17D4nHmjxRL7xU2ZlHIue0FZFVo0iV3NnKX2:dsn134nHkl7tZlHIueAZnQpE2

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe
    "C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://clownfish-translator.com/voicechanger/#download
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce26f46f8,0x7ffce26f4708,0x7ffce26f4718
        3⤵
          PID:1636
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
          3⤵
            PID:1044
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2052
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:8
            3⤵
              PID:1568
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              3⤵
                PID:4740
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                3⤵
                  PID:4460
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                  3⤵
                    PID:4896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1056
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:1
                    3⤵
                      PID:2068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                      3⤵
                        PID:864
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:1
                        3⤵
                          PID:1308
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:1
                          3⤵
                            PID:2864
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3204 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:384
                        • C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe
                          "C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe"
                          2⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3360
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"
                            3⤵
                              PID:384
                              • C:\Windows\system32\regsvr32.exe
                                /s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"
                                4⤵
                                • Modifies registry class
                                PID:3132
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4492
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1400
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                              1⤵
                                PID:2860
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x4dc 0x4f0
                                1⤵
                                  PID:2696

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  10fa19df148444a77ceec60cabd2ce21

                                  SHA1

                                  685b599c497668166ede4945d8885d204fd8d70f

                                  SHA256

                                  c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b

                                  SHA512

                                  3518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  75c9f57baeefeecd6c184627de951c1e

                                  SHA1

                                  52e0468e13cbfc9f15fc62cc27ce14367a996cff

                                  SHA256

                                  648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f

                                  SHA512

                                  c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  336B

                                  MD5

                                  dec2b18e448b259e17a67553faece93d

                                  SHA1

                                  ee54e4087ea117261cca52841922403bb40295b0

                                  SHA256

                                  5bec4d8561dfaed71ce02490ed945e0ce07407ae66d25a3d39b635cf3d88fe89

                                  SHA512

                                  333d2b2bd9d51455abf897bce6779f76adbbcf3a9b60ec4fb2e45fa863e30081d6f24bdb6ffad9cca894da5563e7b1d984b1c6fc321a7f3690313ab82f2c2882

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  52c974143548fe4cb052ca641236efe8

                                  SHA1

                                  80a0e1949df69479843ac9648c61bfdd5639411a

                                  SHA256

                                  3a48d6c2230e7e240b8fe527bf22489f0aed4f73487998bf34e7726b1e1cab87

                                  SHA512

                                  7fec823de810b113d2ae508adff365d7558a4fbb2feb1a1cf8ff0aba894dc168960d60617d0a7a1e035c2c43c821b2e6f1f169314cda6fb20347d8c75fe324cf

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  a53f5a5b002180a22d4fce6265be8adc

                                  SHA1

                                  7ffd9be39d7baa6fcf577632f86de561bada87e2

                                  SHA256

                                  a9aaefc6a8e39d5a1e3685ea18cb935baeedc9fff3fc16451d53fb93862ded9d

                                  SHA512

                                  7bf78d1d80da03e2229ba74c299f91841e77617349a8ac623c7dca5689247835607b108e92b02377b21baddb025168cb8c2ef312df9972a5fe9a60d867257f49

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  48c8e709f0fe01a598b19b65cebe7471

                                  SHA1

                                  8f5e8e8ac2d2f9a847baf6ee2849b9cfb4709874

                                  SHA256

                                  a278d3c1fde5464d34057654b17f5ebde3c50af816a4faf15122e3031465756c

                                  SHA512

                                  d38e0b888dae4108676aeace69cfa6385ac63020fe1ffb3f2ff2f4bb745439ad1c9582066499e0bb962d447c87f4351631a5877ff8943c5806ea0c68fc233ebd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  28e29738bddc37565218fe4529b06a0b

                                  SHA1

                                  b185950327f5a3afba49d4223a337edcf727dd0d

                                  SHA256

                                  855250dc0be6a15e2834f9f0a0214540122d521247c9a3d1c8b572ce17756d9e

                                  SHA512

                                  449b7bcec40daef8ff9e111d47263ec7e5eb42b1c84eceb1288f0d1e9b86e383d70c598b20598c6c7b2ae9e12bd9ed9793907a03469a22a878dbdac4e01d1139

                                • C:\Users\Admin\Documents\ClownfishVoiceChanger.ini

                                  Filesize

                                  709B

                                  MD5

                                  a3de0f4aa718ca194b86d23912e01911

                                  SHA1

                                  5b511d76efe82ba75207865866ab844f5848a5dd

                                  SHA256

                                  993ffe4295fe8d6ddcb70e03b65b2f3ac5eb21099d0ce9a7dda6510348a1c5b2

                                  SHA512

                                  c7c736f9b24daa1cf44971ce68262383c8ebc18c96c09e7b3b4b7bc6502a67e859b798debb6a917cd0dab0bd787baea902482471d600957a430fe775a4e9be5f