Overview
overview
5Static
static
3VoiceChang...85.exe
windows7-x64
4VoiceChang...85.exe
windows10-2004-x64
4$8/APOConfig.exe
windows7-x64
5$8/APOConfig.exe
windows10-2004-x64
5$8/AudioChanger.exe
windows7-x64
1$8/AudioChanger.exe
windows10-2004-x64
1$8/Clownfi...er.exe
windows7-x64
5$8/Clownfi...er.exe
windows10-2004-x64
5$8/ClownfshAPO64.dll
windows7-x64
5$8/ClownfshAPO64.dll
windows10-2004-x64
5$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
VoiceChanger64f1.85.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VoiceChanger64f1.85.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$8/APOConfig.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$8/APOConfig.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$8/AudioChanger.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$8/AudioChanger.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$8/ClownfishVoiceChanger.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$8/ClownfishVoiceChanger.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$8/ClownfshAPO64.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$8/ClownfshAPO64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/LockedList.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/LockedList.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
$8/ClownfishVoiceChanger.exe
-
Size
862KB
-
MD5
10f9a97d64aa92c48f6c8535dfdfe08c
-
SHA1
07480480e7ce22277912006cd69a151aadaa2c20
-
SHA256
e726c5afb2b5dc493bf141eb3d0eac7506ee27253df1941816bfeb0d1e1191a7
-
SHA512
c8ce4b7694e07d9f00cd6291f4529433d202bb544771f0830ed9f63ebf3dfd2370308491d835fca7dd17f9ee821cc81cf3d734b7305a02a5beac39d1a59e1aac
-
SSDEEP
12288:bOp8vZHvmz3qvmJMwyK/MjD2bWo9uNLNC7GWJG5U6wOOTiBm/b:bOpMZH+e4DN/Mn2+NLNChoNSb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ClownfishVoiceChanger.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APOConfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MajorVersion = "1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\ = "ClownfishAPO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\Copyright = "Developed in Shark Labs, Sofia, 2016-2024" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxInputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinOutputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinInputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxOutputConnections = "1" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MaxInstances = "4294967295" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\NumAPOInterfaces = "1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\APOInterface0 = "{FD7F2B29-24D0-4B5C-B177-592C39F9CA10}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\FriendlyName = "ClownfishAPO" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\MinorVersion = "0" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioEngine\AudioProcessingObjects\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\Flags = "15" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$8\\ClownfshAPO64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{80E0C6D1-9465-43B2-9BD5-27A3A56CF1B3}\InprocServer32 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2912 APOConfig.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4976 ClownfishVoiceChanger.exe 4976 ClownfishVoiceChanger.exe 4976 ClownfishVoiceChanger.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4976 ClownfishVoiceChanger.exe 4976 ClownfishVoiceChanger.exe 4976 ClownfishVoiceChanger.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4976 ClownfishVoiceChanger.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2912 4976 ClownfishVoiceChanger.exe 95 PID 4976 wrote to memory of 2912 4976 ClownfishVoiceChanger.exe 95 PID 4976 wrote to memory of 2912 4976 ClownfishVoiceChanger.exe 95 PID 2912 wrote to memory of 2560 2912 APOConfig.exe 98 PID 2912 wrote to memory of 2560 2912 APOConfig.exe 98 PID 2912 wrote to memory of 2560 2912 APOConfig.exe 98 PID 2560 wrote to memory of 3932 2560 regsvr32.exe 99 PID 2560 wrote to memory of 3932 2560 regsvr32.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe"C:\Users\Admin\AppData\Local\Temp\$8\ClownfishVoiceChanger.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe"C:\Users\Admin\AppData\Local\Temp\$8\APOConfig.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll"4⤵
- Modifies registry class
PID:3932
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x4ac1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748B
MD54f113e85d9aed4c508015c465fbb92fb
SHA139ee7cf5c0d9b83ae6d9d48c9797a2f78e418c86
SHA256952af17bf4042a0428ba28eb4ed3eb8f878092d1d0b6419a78fcbed9e093551e
SHA5124ae8484cde1c3025fe35dada0b7b37e89fb6194657a01d007be82b3a9bedce9b30296cb94b8357b90fc8980297eca4c0ae5897b63b460938317506693024679f