Overview
overview
10Static
static
3Valorant-S...64.exe
windows10-2004-x64
1Valorant-S...FN.bat
windows10-2004-x64
7Valorant-S...te.bat
windows10-2004-x64
7Valorant-S...e2.bat
windows10-2004-x64
1Valorant-S...e3.bat
windows10-2004-x64
8Valorant-S...e4.exe
windows10-2004-x64
10Valorant-S...fy.exe
windows10-2004-x64
5Valorant-S...ry.bat
windows10-2004-x64
1Valorant-S...fy.sys
windows10-2004-x64
1Valorant-S...id.exe
windows10-2004-x64
7Valorant-S...de.sys
windows10-2004-x64
1Valorant-S...64.sys
windows10-2004-x64
1Valorant-S...er.bat
windows10-2004-x64
1Valorant-S...ad.bat
windows10-2004-x64
8Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
Valorant-Spoofer-main/AMIDEWINx64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Valorant-Spoofer-main/FN.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Valorant-Spoofer-main/Fortnite.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Valorant-Spoofer-main/Fortnite2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Valorant-Spoofer-main/Fortnite3.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Valorant-Spoofer-main/Fortnite4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Valorant-Spoofer-main/MapperSpoofy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Valorant-Spoofer-main/Registry.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Valorant-Spoofer-main/Spoofy.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Valorant-Spoofer-main/Volumeid.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Valorant-Spoofer-main/amide.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Valorant-Spoofer-main/amifldrv64.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Valorant-Spoofer-main/cleaner.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Valorant-Spoofer-main/load.bat
Resource
win10v2004-20240709-en
General
-
Target
Valorant-Spoofer-main/Volumeid.exe
-
Size
228KB
-
MD5
4d867033b27c8a603de4885b449c4923
-
SHA1
f1ace1a241bab6efb3c7059a68b6e9bbe258da83
-
SHA256
22a2484d7fa799e6e71e310141614884f3bc8dad8ac749b6f1c475b5398a72f3
-
SHA512
b5d6d4a58d8780a43e69964f80525905224fa020c0032e637cd25557097e331f63d156cceaaacfe1a692ca8cea8d8bd1b219468b6b8e4827c90febe1535a5702
-
SSDEEP
3072:OgfbRmDIHA98kK2WndTslNac+dA6YdqhsXCNZpp4GIoHZUFozD3zgJwDmr9u76v9:OSCgkKdcg9vCoaoMpcto
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\INF\prnms007.inf cmd.exe File opened for modification C:\Windows\INF\uaspstor.inf cmd.exe File opened for modification C:\Windows\INF\hidscanner.inf cmd.exe File opened for modification C:\Windows\INF\mdminfot.inf cmd.exe File opened for modification C:\Windows\INF\c_fsinfrastructure.inf cmd.exe File opened for modification C:\Windows\INF\mlx4_bus.inf cmd.exe File opened for modification C:\Windows\INF\pnpxinternetgatewaydevices.inf cmd.exe File opened for modification C:\Windows\INF\c_camera.inf cmd.exe File opened for modification C:\Windows\INF\mdmsupra.inf cmd.exe File opened for modification C:\Windows\INF\MSDTC\0411\msdtcprf.ini cmd.exe File opened for modification C:\Windows\INF\netrtwlane.inf cmd.exe File opened for modification C:\Windows\INF\TermService\0C0A\tslabels.ini cmd.exe File opened for modification C:\Windows\INF\UGTHRSVC\040C\gthrctr.ini cmd.exe File opened for modification C:\Windows\INF\UGTHRSVC\gthrctr.h cmd.exe File opened for modification C:\Windows\INF\c_multifunction.inf cmd.exe File opened for modification C:\Windows\INF\MSDTC\0407\msdtcprf.ini cmd.exe File opened for modification C:\Windows\INF\mdmusrsp.inf cmd.exe File opened for modification C:\Windows\INF\netwew01.inf cmd.exe File opened for modification C:\Windows\INF\rndiscmp.inf cmd.exe File opened for modification C:\Windows\INF\SERVIC~2.0\040C\_ServiceModelOperationPerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\TermService\0407\tslabels.ini cmd.exe File opened for modification C:\Windows\INF\c_apo.inf cmd.exe File opened for modification C:\Windows\INF\mdmnova.inf cmd.exe File opened for modification C:\Windows\INF\microsoft_bluetooth_a2dp_src.inf cmd.exe File opened for modification C:\Windows\INF\mdmnttd2.inf cmd.exe File opened for modification C:\Windows\INF\mdmtkr.inf cmd.exe File opened for modification C:\Windows\INF\megasas.inf cmd.exe File opened for modification C:\Windows\INF\SERVIC~1.0\0411\_ServiceModelEndpointPerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\usbhub3.inf cmd.exe File opened for modification C:\Windows\INF\.NET Data Provider for Oracle\_DataOracleClientPerfCounters_shared12_neutral.ini cmd.exe File opened for modification C:\Windows\INF\hal.inf cmd.exe File opened for modification C:\Windows\INF\mdmeiger.inf cmd.exe File opened for modification C:\Windows\INF\mdmvv.inf cmd.exe File opened for modification C:\Windows\INF\c_fshsm.inf cmd.exe File opened for modification C:\Windows\INF\hidinterrupt.inf cmd.exe File opened for modification C:\Windows\INF\UGTHRSVC\0C0A\gthrctr.ini cmd.exe File opened for modification C:\Windows\INF\intelta.inf cmd.exe File opened for modification C:\Windows\INF\megasas2i.inf cmd.exe File opened for modification C:\Windows\INF\netl260a.inf cmd.exe File opened for modification C:\Windows\INF\mdmgatew.inf cmd.exe File opened for modification C:\Windows\INF\mdmsonyu.inf cmd.exe File opened for modification C:\Windows\INF\cpu.inf cmd.exe File opened for modification C:\Windows\INF\defltwk.inf cmd.exe File opened for modification C:\Windows\INF\msdri.inf cmd.exe File opened for modification C:\Windows\INF\ndisimplatform.inf cmd.exe File opened for modification C:\Windows\INF\c_smrdisk.inf cmd.exe File opened for modification C:\Windows\INF\mdmzyxel.inf cmd.exe File opened for modification C:\Windows\INF\c_fscontentscreener.inf cmd.exe File opened for modification C:\Windows\INF\mdmusrgl.inf cmd.exe File opened for modification C:\Windows\INF\SMSvcHost 4.0.0.0\_SMSvcHostPerfCounters.ini cmd.exe File opened for modification C:\Windows\INF\.NET CLR Networking 4.0.0.0\0000\_Networkingperfcounters_d.ini cmd.exe File opened for modification C:\Windows\INF\.NET CLR Networking 4.0.0.0\0C0A\_Networkingperfcounters_d.ini cmd.exe File opened for modification C:\Windows\INF\hidbthle.inf cmd.exe File opened for modification C:\Windows\INF\mdmsuprv.inf cmd.exe File opened for modification C:\Windows\INF\netrast.inf cmd.exe File opened for modification C:\Windows\INF\c_fscompression.inf cmd.exe File opened for modification C:\Windows\INF\c_sslaccel.inf cmd.exe File opened for modification C:\Windows\INF\prnms003.inf cmd.exe File opened for modification C:\Windows\INF\stornvme.inf cmd.exe File opened for modification C:\Windows\INF\TAPISRV\040C\tapiperf.ini cmd.exe File opened for modification C:\Windows\INF\tpmvsc.inf cmd.exe File opened for modification C:\Windows\INF\mdmkortx.inf cmd.exe File opened for modification C:\Windows\INF\netl1c63x64.inf cmd.exe File opened for modification C:\Windows\INF\c_1394.inf cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2896 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3484 reg.exe 4532 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3768 2856 cmd.exe 103 PID 2856 wrote to memory of 3768 2856 cmd.exe 103 PID 2856 wrote to memory of 984 2856 cmd.exe 104 PID 2856 wrote to memory of 984 2856 cmd.exe 104 PID 2856 wrote to memory of 2864 2856 cmd.exe 105 PID 2856 wrote to memory of 2864 2856 cmd.exe 105 PID 2856 wrote to memory of 3484 2856 cmd.exe 106 PID 2856 wrote to memory of 3484 2856 cmd.exe 106 PID 2856 wrote to memory of 4532 2856 cmd.exe 107 PID 2856 wrote to memory of 4532 2856 cmd.exe 107 PID 2856 wrote to memory of 5020 2856 cmd.exe 108 PID 2856 wrote to memory of 5020 2856 cmd.exe 108 PID 2856 wrote to memory of 4924 2856 cmd.exe 109 PID 2856 wrote to memory of 4924 2856 cmd.exe 109 PID 2856 wrote to memory of 4296 2856 cmd.exe 110 PID 2856 wrote to memory of 4296 2856 cmd.exe 110 PID 2856 wrote to memory of 2896 2856 cmd.exe 111 PID 2856 wrote to memory of 2896 2856 cmd.exe 111 PID 2856 wrote to memory of 4664 2856 cmd.exe 113 PID 2856 wrote to memory of 4664 2856 cmd.exe 113 PID 2856 wrote to memory of 3116 2856 cmd.exe 114 PID 2856 wrote to memory of 3116 2856 cmd.exe 114 PID 2856 wrote to memory of 5048 2856 cmd.exe 115 PID 2856 wrote to memory of 5048 2856 cmd.exe 115 PID 2856 wrote to memory of 4196 2856 cmd.exe 116 PID 2856 wrote to memory of 4196 2856 cmd.exe 116 PID 2856 wrote to memory of 3656 2856 cmd.exe 117 PID 2856 wrote to memory of 3656 2856 cmd.exe 117 PID 2856 wrote to memory of 3148 2856 cmd.exe 118 PID 2856 wrote to memory of 3148 2856 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Volumeid.exe"C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Volumeid.exe"1⤵PID:3484
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Fortnite.bat" "1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:3768
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:984
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:2864
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d 27408 /f2⤵
- Modifies registry key
PID:3484
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d 14400 /f2⤵
- Modifies registry key
PID:4532
-
-
C:\Windows\system32\reg.exereg delete"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\WMI\Security\" /f2⤵PID:5020
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:4924
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:4296
-
-
C:\Windows\system32\taskkill.exetaskkill /IM "EpicGamesLauncher.exe" /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-2097722829-2509645790-3642206209-1001\Software\Epic Games" /f2⤵PID:4664
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig" /f2⤵PID:3116
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:5048
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:4196
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:3656
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:3148
-