Analysis
-
max time kernel
29s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/03/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
valorantlite (1).exe
Resource
win10v2004-20240226-en
General
-
Target
valorantlite (1).exe
-
Size
9.2MB
-
MD5
5dede0e5fce17bff5157b16d8ece5687
-
SHA1
0052453250f03212f3e542b9021e2fbcc7816d45
-
SHA256
e5abc0ab0a44724a339f4e4a9bd9dadf2ccf646039123f5988a6b798516119a8
-
SHA512
e458a43f338e60dac66d206c5955bab6cce7578d219bcae22154229d78105f92aa0c8c18fa486108c2b97c45aae19ebdafe93fc69d5e87bdf97bb24c7ca5e258
-
SSDEEP
196608:X+uMx39cel0isVkjB14nhiF6Bzool63lY/GFuPO9PjDa:XJGioZT/eBzooCpF8WPjG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ valorantlite (1).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion valorantlite (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion valorantlite (1).exe -
Loads dropped DLL 1 IoCs
pid Process 328 valorantlite (1).exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA valorantlite (1).exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: cmd.exe File opened (read-only) \??\X: cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum valorantlite (1).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 valorantlite (1).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe 328 valorantlite (1).exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 328 wrote to memory of 4312 328 valorantlite (1).exe 86 PID 328 wrote to memory of 4312 328 valorantlite (1).exe 86 PID 4312 wrote to memory of 3940 4312 cmd.exe 87 PID 4312 wrote to memory of 3940 4312 cmd.exe 87 PID 328 wrote to memory of 4876 328 valorantlite (1).exe 88 PID 328 wrote to memory of 4876 328 valorantlite (1).exe 88 PID 328 wrote to memory of 2524 328 valorantlite (1).exe 89 PID 328 wrote to memory of 2524 328 valorantlite (1).exe 89 PID 328 wrote to memory of 1352 328 valorantlite (1).exe 90 PID 328 wrote to memory of 1352 328 valorantlite (1).exe 90 PID 328 wrote to memory of 1088 328 valorantlite (1).exe 91 PID 328 wrote to memory of 1088 328 valorantlite (1).exe 91 PID 328 wrote to memory of 1976 328 valorantlite (1).exe 92 PID 328 wrote to memory of 1976 328 valorantlite (1).exe 92 PID 328 wrote to memory of 3272 328 valorantlite (1).exe 93 PID 328 wrote to memory of 3272 328 valorantlite (1).exe 93 PID 328 wrote to memory of 3732 328 valorantlite (1).exe 94 PID 328 wrote to memory of 3732 328 valorantlite (1).exe 94 PID 328 wrote to memory of 568 328 valorantlite (1).exe 95 PID 328 wrote to memory of 568 328 valorantlite (1).exe 95 PID 328 wrote to memory of 4856 328 valorantlite (1).exe 96 PID 328 wrote to memory of 4856 328 valorantlite (1).exe 96 PID 328 wrote to memory of 4080 328 valorantlite (1).exe 97 PID 328 wrote to memory of 4080 328 valorantlite (1).exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\valorantlite (1).exe"C:\Users\Admin\AppData\Local\Temp\valorantlite (1).exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mountvol X: /S2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\mountvol.exemountvol X: /S3⤵PID:3940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move X:\EFI\Microsoft\Boot\boot.efi X:\EFI\Microsoft\Boot\bootmgfw.efi2⤵
- Enumerates connected drives
PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del X:\EFI\Boot\startup.nsh2⤵PID:1352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del X:\EFI\Boot\bootx64.efi2⤵PID:1976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del X:\mapper.efi2⤵PID:3732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move X:\EFI\Boot\bootx64.efi.backup X:\EFI\Boot\bootx64.efi2⤵
- Enumerates connected drives
PID:4856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f6516cb50f403bf319fac2a3badd1929
SHA1e5e26cf33182495c35ab453ac0df4e97c9eed5cc
SHA256c44ced7452fcb8ddb82eb65656926b3197726aa6602a403054d4a65565190cd6
SHA512235d935d5763aa8c9382615606a8994c2c70d29bfe72b65fe5c2a7283c1ab7e8698824f9dec607838f0978fe611bfca660ca6c776b4517660aad89f620f98ab3