Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 17:17
General
-
Target
Valorant_Cleaner.exe
-
Size
3.1MB
-
MD5
5c04631fafe2dbe3449a83310dcdf9b1
-
SHA1
bccdbaf8352dec9f0e4a25cf74021e23b2ff6a7d
-
SHA256
e085adcc6a2c0ed6115ccb2b9ddaf5b8204b0e9c7a2f62c4fe922b0551d96f53
-
SHA512
2eb26a7690d29b785a6c8d05bc317e8c720dbeb4173b46afbd293cca7f1b95f6ab76c01f9731021a35e5733f07cd46cb4f691484f3275b8717cb0f67fa59b174
-
SSDEEP
98304:PM/QLILHnQ9Ku35LGALBqzroXWC8nkYlx:U/QU7QfpVFqnoXWCelx
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Valorant_Cleaner.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Valorant_Cleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Valorant_Cleaner.exe -
resource yara_rule behavioral1/memory/3380-0-0x00007FF628A00000-0x00007FF62929E000-memory.dmp themida behavioral1/memory/3380-2-0x00007FF628A00000-0x00007FF62929E000-memory.dmp themida behavioral1/memory/3380-3-0x00007FF628A00000-0x00007FF62929E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Valorant_Cleaner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3380 Valorant_Cleaner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Valorant_Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\Valorant_Cleaner.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:4656