Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2023, 04:29

Errors

Reason
Machine shutdown

General

  • Target

    ValorantAimbot.exe

  • Size

    130KB

  • MD5

    c2b8f73cd3499ba4924660e056ea057a

  • SHA1

    42b7738039283379b3950dd6709f9a22f220b93f

  • SHA256

    dfd8631d100532fe58139b8bb90dd85dc42a2c563f7ec57289b440d011cacfa5

  • SHA512

    fbe55e1e3a28e165efa933dae837da832452937ee5a993d5b628f898c57b2c5dbe5d9ed3da28898bc5e036dcbe0c12713d5947aeaaac8597449f33b8234c9840

  • SSDEEP

    3072:i7DhdC6kzWypvaQ0FxyNTBflrZjuwh67h4mM05/:iBlkZvaF4NTBdrhF65vB

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ValorantAimbot.exe
    "C:\Users\Admin\AppData\Local\Temp\ValorantAimbot.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6A28.tmp\6A29.tmp\6A2A.bat C:\Users\Admin\AppData\Local\Temp\ValorantAimbot.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\system32\shutdown.exe
        shutdown -s -f -t 15 -c "HAHAHAHAHA HACKEADO BY N1TR0zzzz, todas suas senhas foram enviada a database"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1540
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39f4055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4956

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6A28.tmp\6A29.tmp\6A2A.bat

          Filesize

          41KB

          MD5

          46848869f9bfcbd5383fb50632aed40c

          SHA1

          bb7f10e88900dadc9e074085a388f43a4f6c4635

          SHA256

          346f2a01ac715c941b2b938ab817786d7a17224a914007584fef91e678300b0b

          SHA512

          7363208958a8e23e21c1fc24e9e0428b9ce30df69c06ddc570dde3b4f35b3f891d7df31496535f2da75194b4024b87b0f5c0517e0e0ce1a0208f171a26390775