Overview
overview
3Static
static
1Valorant-U...in.zip
windows7-x64
1Valorant-U...in.zip
windows10-2004-x64
1Valorant-U...DME.md
windows7-x64
3Valorant-U...DME.md
windows10-2004-x64
3Valorant-U...ain.py
windows7-x64
3Valorant-U...ain.py
windows10-2004-x64
3Valorant-U...rt.bat
windows7-x64
1Valorant-U...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
Valorant-Unlocker-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Valorant-Unlocker-main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Valorant-Unlocker-main/README.md
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Valorant-Unlocker-main/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Valorant-Unlocker-main/main.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Valorant-Unlocker-main/main.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Valorant-Unlocker-main/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Valorant-Unlocker-main/start.bat
Resource
win10v2004-20240226-en
General
-
Target
Valorant-Unlocker-main/README.md
-
Size
614B
-
MD5
8208182a9c7c9ab5eb7b683461f71f1c
-
SHA1
08813f57cdcd9372238710e737f09c221e7041cc
-
SHA256
3929721ec188925cf1216a9554b1c12a9b8acfc2076e2934bd0229026419d959
-
SHA512
dabec07032b4f4394ebb758d0a149f938379ae5a9242c716edfe8df1d6ba9bb9c96f90d4ed14b32c0d8f288a849bb65956c5e366175cdbd1917e4b98a2f206c4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 AcroRd32.exe 2680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2900 2336 cmd.exe 29 PID 2336 wrote to memory of 2900 2336 cmd.exe 29 PID 2336 wrote to memory of 2900 2336 cmd.exe 29 PID 2900 wrote to memory of 2680 2900 rundll32.exe 30 PID 2900 wrote to memory of 2680 2900 rundll32.exe 30 PID 2900 wrote to memory of 2680 2900 rundll32.exe 30 PID 2900 wrote to memory of 2680 2900 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Valorant-Unlocker-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Valorant-Unlocker-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Valorant-Unlocker-main\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d594e9db3bb41c4c7065697fc7a5f47f
SHA1b379adcecf6fd07d7a6cc3cf9d7bf7b2f2aa49d7
SHA25639d0cc8a179a7bc8a9a1c4a94d36b5a111a55c04114693cb9efe21df8907e1fd
SHA512dfc7020bb6b9f36f464611266f7760f2a8c305f0205fc78fb44c3653d1c8040ab4290d8bf629cb94139b4117359bdbdf78e13f4320d2b3999907d456c8bd3fa8