Overview
overview
8Static
static
Spoofer_Va...es.url
windows7-x64
1Spoofer_Va...es.url
windows10-2004-x64
1Spoofer_Va...ck.bat
windows7-x64
1Spoofer_Va...ck.bat
windows10-2004-x64
1Spoofer_Va...er.exe
windows7-x64
1Spoofer_Va...er.exe
windows10-2004-x64
1Spoofer_Va.../s.exe
windows7-x64
Spoofer_Va.../s.exe
windows10-2004-x64
Spoofer_Va...of.bat
windows7-x64
8Spoofer_Va...of.bat
windows10-2004-x64
8Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-09-2022 20:44
Static task
static1
Behavioral task
behavioral1
Sample
Spoofer_Valorant_CHEATER.FUN_/Free Hacks for Games.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Spoofer_Valorant_CHEATER.FUN_/Free Hacks for Games.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Spoofer_Valorant_CHEATER.FUN_/_Serial_check.bat
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Spoofer_Valorant_CHEATER.FUN_/_Serial_check.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Spoofer_Valorant_CHEATER.FUN_/kdmapper.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Spoofer_Valorant_CHEATER.FUN_/kdmapper.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Spoofer_Valorant_CHEATER.FUN_/s.exe
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Spoofer_Valorant_CHEATER.FUN_/s.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Spoofer_Valorant_CHEATER.FUN_/spoof.bat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
Spoofer_Valorant_CHEATER.FUN_/spoof.bat
Resource
win10v2004-20220812-en
General
-
Target
Spoofer_Valorant_CHEATER.FUN_/_Serial_check.bat
-
Size
379B
-
MD5
8e41c1119dcdee8febbd28804d505340
-
SHA1
5a1b961d46fb6da49a9622932454a7054e6ba4e9
-
SHA256
40f99c57038349e8affe1377624b31fece393fdbf85a7147ec975d549028431c
-
SHA512
91210511a83d4654ba4408cd80e443827d299c656593d8324a971801eada594d76a2e0da45cb6f22fceb4ec4944cf214bf2697646d6dc26d629bcd82087294e7
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1068 WMIC.exe Token: SeSecurityPrivilege 1068 WMIC.exe Token: SeTakeOwnershipPrivilege 1068 WMIC.exe Token: SeLoadDriverPrivilege 1068 WMIC.exe Token: SeSystemProfilePrivilege 1068 WMIC.exe Token: SeSystemtimePrivilege 1068 WMIC.exe Token: SeProfSingleProcessPrivilege 1068 WMIC.exe Token: SeIncBasePriorityPrivilege 1068 WMIC.exe Token: SeCreatePagefilePrivilege 1068 WMIC.exe Token: SeBackupPrivilege 1068 WMIC.exe Token: SeRestorePrivilege 1068 WMIC.exe Token: SeShutdownPrivilege 1068 WMIC.exe Token: SeDebugPrivilege 1068 WMIC.exe Token: SeSystemEnvironmentPrivilege 1068 WMIC.exe Token: SeRemoteShutdownPrivilege 1068 WMIC.exe Token: SeUndockPrivilege 1068 WMIC.exe Token: SeManageVolumePrivilege 1068 WMIC.exe Token: 33 1068 WMIC.exe Token: 34 1068 WMIC.exe Token: 35 1068 WMIC.exe Token: SeIncreaseQuotaPrivilege 1068 WMIC.exe Token: SeSecurityPrivilege 1068 WMIC.exe Token: SeTakeOwnershipPrivilege 1068 WMIC.exe Token: SeLoadDriverPrivilege 1068 WMIC.exe Token: SeSystemProfilePrivilege 1068 WMIC.exe Token: SeSystemtimePrivilege 1068 WMIC.exe Token: SeProfSingleProcessPrivilege 1068 WMIC.exe Token: SeIncBasePriorityPrivilege 1068 WMIC.exe Token: SeCreatePagefilePrivilege 1068 WMIC.exe Token: SeBackupPrivilege 1068 WMIC.exe Token: SeRestorePrivilege 1068 WMIC.exe Token: SeShutdownPrivilege 1068 WMIC.exe Token: SeDebugPrivilege 1068 WMIC.exe Token: SeSystemEnvironmentPrivilege 1068 WMIC.exe Token: SeRemoteShutdownPrivilege 1068 WMIC.exe Token: SeUndockPrivilege 1068 WMIC.exe Token: SeManageVolumePrivilege 1068 WMIC.exe Token: 33 1068 WMIC.exe Token: 34 1068 WMIC.exe Token: 35 1068 WMIC.exe Token: SeIncreaseQuotaPrivilege 1152 WMIC.exe Token: SeSecurityPrivilege 1152 WMIC.exe Token: SeTakeOwnershipPrivilege 1152 WMIC.exe Token: SeLoadDriverPrivilege 1152 WMIC.exe Token: SeSystemProfilePrivilege 1152 WMIC.exe Token: SeSystemtimePrivilege 1152 WMIC.exe Token: SeProfSingleProcessPrivilege 1152 WMIC.exe Token: SeIncBasePriorityPrivilege 1152 WMIC.exe Token: SeCreatePagefilePrivilege 1152 WMIC.exe Token: SeBackupPrivilege 1152 WMIC.exe Token: SeRestorePrivilege 1152 WMIC.exe Token: SeShutdownPrivilege 1152 WMIC.exe Token: SeDebugPrivilege 1152 WMIC.exe Token: SeSystemEnvironmentPrivilege 1152 WMIC.exe Token: SeRemoteShutdownPrivilege 1152 WMIC.exe Token: SeUndockPrivilege 1152 WMIC.exe Token: SeManageVolumePrivilege 1152 WMIC.exe Token: 33 1152 WMIC.exe Token: 34 1152 WMIC.exe Token: 35 1152 WMIC.exe Token: SeIncreaseQuotaPrivilege 1152 WMIC.exe Token: SeSecurityPrivilege 1152 WMIC.exe Token: SeTakeOwnershipPrivilege 1152 WMIC.exe Token: SeLoadDriverPrivilege 1152 WMIC.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1068 1816 cmd.exe 28 PID 1816 wrote to memory of 1068 1816 cmd.exe 28 PID 1816 wrote to memory of 1068 1816 cmd.exe 28 PID 1816 wrote to memory of 1152 1816 cmd.exe 30 PID 1816 wrote to memory of 1152 1816 cmd.exe 30 PID 1816 wrote to memory of 1152 1816 cmd.exe 30 PID 1816 wrote to memory of 1764 1816 cmd.exe 31 PID 1816 wrote to memory of 1764 1816 cmd.exe 31 PID 1816 wrote to memory of 1764 1816 cmd.exe 31 PID 1816 wrote to memory of 588 1816 cmd.exe 32 PID 1816 wrote to memory of 588 1816 cmd.exe 32 PID 1816 wrote to memory of 588 1816 cmd.exe 32 PID 1816 wrote to memory of 1500 1816 cmd.exe 34 PID 1816 wrote to memory of 1500 1816 cmd.exe 34 PID 1816 wrote to memory of 1500 1816 cmd.exe 34 PID 1816 wrote to memory of 1156 1816 cmd.exe 35 PID 1816 wrote to memory of 1156 1816 cmd.exe 35 PID 1816 wrote to memory of 1156 1816 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Spoofer_Valorant_CHEATER.FUN_\_Serial_check.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\System32\Wbem\WMIC.exewmic memorychip get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber2⤵PID:1764
-
-
C:\Windows\system32\getmac.exegetmac /NH2⤵PID:588
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get ProcessorId,name2⤵PID:1500
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid,name,version2⤵PID:1156
-