Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 17:17

General

  • Target

    Valorant_Cleaner.exe

  • Size

    3.1MB

  • MD5

    5c04631fafe2dbe3449a83310dcdf9b1

  • SHA1

    bccdbaf8352dec9f0e4a25cf74021e23b2ff6a7d

  • SHA256

    e085adcc6a2c0ed6115ccb2b9ddaf5b8204b0e9c7a2f62c4fe922b0551d96f53

  • SHA512

    2eb26a7690d29b785a6c8d05bc317e8c720dbeb4173b46afbd293cca7f1b95f6ab76c01f9731021a35e5733f07cd46cb4f691484f3275b8717cb0f67fa59b174

  • SSDEEP

    98304:PM/QLILHnQ9Ku35LGALBqzroXWC8nkYlx:U/QU7QfpVFqnoXWCelx

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Valorant_Cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\Valorant_Cleaner.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:3380
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4656

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3380-0-0x00007FF628A00000-0x00007FF62929E000-memory.dmp

            Filesize

            8.6MB

          • memory/3380-1-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

            Filesize

            2.0MB

          • memory/3380-2-0x00007FF628A00000-0x00007FF62929E000-memory.dmp

            Filesize

            8.6MB

          • memory/3380-3-0x00007FF628A00000-0x00007FF62929E000-memory.dmp

            Filesize

            8.6MB

          • memory/3380-5-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

            Filesize

            2.0MB