An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.(Citation: ESET Attor Oct 2019) Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture audio. Audio files may be written to disk and exfiltrated later.
Supported Platforms: Windows
auto_generated_guid: 9c3ad250-b185-4444-b5a9-d69218a10c95
1
powershell
!1
powershell.exe -Command WindowsAudioDevice-Powershell-Cmdlet
can-you-track-processes-accessing-the-camera-and-microphone
Supported Platforms: Windows
auto_generated_guid: 7a21cce2-6ada-4f7c-afd9-e1e9c481e44a
1
command_prompt
!reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged\C:#Windows#Temp#atomic.exe /v LastUsedTimeStart /t REG_BINARY /d a273b6f07104d601 /f
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged\C:#Windows#Temp#atomic.exe /v LastUsedTimeStop /t REG_BINARY /d 96ef514b7204d601 /f
reg DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged\C:#Windows#Temp#atomic.exe /f
Use AppleScript to get Quicktime Player to record an audio file from the default microphone.
Should create a non-empty m4a file with sound from the microphone.
Supported Platforms: macOS
auto_generated_guid: c7a0bb71-70ce-4a53-b115-881f241b795b
| Name | Description | Type | Default Value | |——|————-|——|—————| | filename | Location of the script | path | PathToAtomicsFolder/T1123/src/T1123.sh| | audiofile | Location of the recorded audio file | path | /tmp/T1123.m4a| | duration | Length of recording to make in seconds | integer | 5|
1
sh
!1
sh #{filename} #{audiofile} #{duration}
1
2
3
if test -w #{audiofile}; then
rm #{audiofile}
fi