Overview
overview
5Static
static
3VoiceChang...6).exe
windows7-x64
5VoiceChang...6).exe
windows10-2004-x64
4$8/APOConfig.exe
windows7-x64
5$8/APOConfig.exe
windows10-2004-x64
5$8/Clownfi...er.exe
windows7-x64
5$8/Clownfi...er.exe
windows10-2004-x64
5$8/ClownfshAPO64.dll
windows7-x64
5$8/ClownfshAPO64.dll
windows10-2004-x64
5$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
VoiceChanger64f(1.66).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VoiceChanger64f(1.66).exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$8/APOConfig.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$8/APOConfig.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$8/ClownfishVoiceChanger.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$8/ClownfishVoiceChanger.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$8/ClownfshAPO64.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$8/ClownfshAPO64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LockedList.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LockedList.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
General
-
Target
$8/ClownfishVoiceChanger.exe
-
Size
805KB
-
MD5
208c37506cddf0613517488da3287d12
-
SHA1
99b918443e424af947ed10aa84fa242af70ca856
-
SHA256
d29a8c5ad1704c7fbe0e24fadf4a8a1dabe441c84f9dfe4359755cc76c148a61
-
SHA512
0318dd9ecf5d41504f60fc0f71ac306cafbfb75808c7597a2ab3b745a487d042371fe5c159e42f0a431a29820e4e164e43e78673eb12124b9304adebdf5e2f65
-
SSDEEP
12288:ddCn17D4nHmjxRL7xU2ZlHIue0FZFVo0iV3NnKX2:dsn134nHkl7tZlHIueAZnQpE2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation ClownfishVoiceChanger.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\Flags = "15" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxInputConnections = "1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\ = "ClownfishAPO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\Copyright = "Developed in Shark Labs, Sofia, 2016-2021" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\FriendlyName = "ClownfishAPO" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinInputConnections = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinOutputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxOutputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxInstances = "4294967295" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\APOInterface0 = "{FD7F2B29-24D0-4B5C-B177-592C39F9CA10}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$8\\ClownfshAPO64.dll" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MajorVersion = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinorVersion = "0" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\NumAPOInterfaces = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3} regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 4616 msedge.exe 4616 msedge.exe 1056 identity_helper.exe 1056 identity_helper.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3360 APOConfig.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3292 ClownfishVoiceChanger.exe 3292 ClownfishVoiceChanger.exe 3292 ClownfishVoiceChanger.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3292 ClownfishVoiceChanger.exe 3292 ClownfishVoiceChanger.exe 3292 ClownfishVoiceChanger.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3292 ClownfishVoiceChanger.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4616 3292 ClownfishVoiceChanger.exe 86 PID 3292 wrote to memory of 4616 3292 ClownfishVoiceChanger.exe 86 PID 4616 wrote to memory of 1636 4616 msedge.exe 87 PID 4616 wrote to memory of 1636 4616 msedge.exe 87 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 1044 4616 msedge.exe 88 PID 4616 wrote to memory of 2052 4616 msedge.exe 89 PID 4616 wrote to memory of 2052 4616 msedge.exe 89 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90 PID 4616 wrote to memory of 1568 4616 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe"C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://clownfish-translator.com/voicechanger/#download2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce26f46f8,0x7ffce26f4708,0x7ffce26f47183⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:23⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:83⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:13⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:13⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:13⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:13⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1694909308007602256,9161796244575257082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3204 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
-
C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe"C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"3⤵PID:384
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"4⤵
- Modifies registry class
PID:3132
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:2860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc 0x4f01⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5dec2b18e448b259e17a67553faece93d
SHA1ee54e4087ea117261cca52841922403bb40295b0
SHA2565bec4d8561dfaed71ce02490ed945e0ce07407ae66d25a3d39b635cf3d88fe89
SHA512333d2b2bd9d51455abf897bce6779f76adbbcf3a9b60ec4fb2e45fa863e30081d6f24bdb6ffad9cca894da5563e7b1d984b1c6fc321a7f3690313ab82f2c2882
-
Filesize
1KB
MD552c974143548fe4cb052ca641236efe8
SHA180a0e1949df69479843ac9648c61bfdd5639411a
SHA2563a48d6c2230e7e240b8fe527bf22489f0aed4f73487998bf34e7726b1e1cab87
SHA5127fec823de810b113d2ae508adff365d7558a4fbb2feb1a1cf8ff0aba894dc168960d60617d0a7a1e035c2c43c821b2e6f1f169314cda6fb20347d8c75fe324cf
-
Filesize
6KB
MD5a53f5a5b002180a22d4fce6265be8adc
SHA17ffd9be39d7baa6fcf577632f86de561bada87e2
SHA256a9aaefc6a8e39d5a1e3685ea18cb935baeedc9fff3fc16451d53fb93862ded9d
SHA5127bf78d1d80da03e2229ba74c299f91841e77617349a8ac623c7dca5689247835607b108e92b02377b21baddb025168cb8c2ef312df9972a5fe9a60d867257f49
-
Filesize
7KB
MD548c8e709f0fe01a598b19b65cebe7471
SHA18f5e8e8ac2d2f9a847baf6ee2849b9cfb4709874
SHA256a278d3c1fde5464d34057654b17f5ebde3c50af816a4faf15122e3031465756c
SHA512d38e0b888dae4108676aeace69cfa6385ac63020fe1ffb3f2ff2f4bb745439ad1c9582066499e0bb962d447c87f4351631a5877ff8943c5806ea0c68fc233ebd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD528e29738bddc37565218fe4529b06a0b
SHA1b185950327f5a3afba49d4223a337edcf727dd0d
SHA256855250dc0be6a15e2834f9f0a0214540122d521247c9a3d1c8b572ce17756d9e
SHA512449b7bcec40daef8ff9e111d47263ec7e5eb42b1c84eceb1288f0d1e9b86e383d70c598b20598c6c7b2ae9e12bd9ed9793907a03469a22a878dbdac4e01d1139
-
Filesize
709B
MD5a3de0f4aa718ca194b86d23912e01911
SHA15b511d76efe82ba75207865866ab844f5848a5dd
SHA256993ffe4295fe8d6ddcb70e03b65b2f3ac5eb21099d0ce9a7dda6510348a1c5b2
SHA512c7c736f9b24daa1cf44971ce68262383c8ebc18c96c09e7b3b4b7bc6502a67e859b798debb6a917cd0dab0bd787baea902482471d600957a430fe775a4e9be5f