Analysis
-
max time kernel
363s -
max time network
367s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
Skyrant V2 Valorant Crack [By LOLSHAN].exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Skyrant V2 Valorant Crack [By LOLSHAN].exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
Skyrant V2 Valorant Crack [By LOLSHAN].exe
Resource
win10v2004-20230703-en
General
-
Target
Skyrant V2 Valorant Crack [By LOLSHAN].exe
-
Size
3.0MB
-
MD5
0d11a233511197f65c30061d56ce250b
-
SHA1
8f2c2f9ac38dbc98634f9ff753ae0103d4ddece7
-
SHA256
8d9e248e884c0bb48674af0b0a18c96f258d287584ebf306dd043e8c46021aae
-
SHA512
3f1514e5fb698cac0722edb51962a5f0d336365e70fa2488e8363a2c6979ea053759aff3331059b4746fb33d4572858e1764b2ecf3c9563aabbbe365feba1544
-
SSDEEP
98304:1GK6yEGrypyuGwylGxyLCdmDDo4MnBpgl:1G0EGmMuGjlGkWdeMbI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1860 Skyrant V2 Valorant Crack [By LOLSHAN].exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1484 1860 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1484 1860 Skyrant V2 Valorant Crack [By LOLSHAN].exe 30 PID 1860 wrote to memory of 1484 1860 Skyrant V2 Valorant Crack [By LOLSHAN].exe 30 PID 1860 wrote to memory of 1484 1860 Skyrant V2 Valorant Crack [By LOLSHAN].exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skyrant V2 Valorant Crack [By LOLSHAN].exe"C:\Users\Admin\AppData\Local\Temp\Skyrant V2 Valorant Crack [By LOLSHAN].exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1860 -s 6762⤵
- Program crash
PID:1484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD59c43f77cb7cff27cb47ed67babe3eda5
SHA1b0400cf68249369d21de86bd26bb84ccffd47c43
SHA256f25b9288fe370dcfcb4823fb4e44ab88c7f5fce6e137d0dba389a3dba07d621e
SHA512cde6fb6cf8db6f9746e69e6c10214e60b3646700d70b49668a2a792e309714dd2d4c5a5241977a833a95fcde8318abcc89eb9968a5039a0b75726bbfa27125a7
-
Filesize
142KB
MD59c43f77cb7cff27cb47ed67babe3eda5
SHA1b0400cf68249369d21de86bd26bb84ccffd47c43
SHA256f25b9288fe370dcfcb4823fb4e44ab88c7f5fce6e137d0dba389a3dba07d621e
SHA512cde6fb6cf8db6f9746e69e6c10214e60b3646700d70b49668a2a792e309714dd2d4c5a5241977a833a95fcde8318abcc89eb9968a5039a0b75726bbfa27125a7