Overview
overview
10Static
static
3Valorant-S...64.exe
windows10-2004-x64
1Valorant-S...FN.bat
windows10-2004-x64
7Valorant-S...te.bat
windows10-2004-x64
7Valorant-S...e2.bat
windows10-2004-x64
1Valorant-S...e3.bat
windows10-2004-x64
8Valorant-S...e4.exe
windows10-2004-x64
10Valorant-S...fy.exe
windows10-2004-x64
5Valorant-S...ry.bat
windows10-2004-x64
1Valorant-S...fy.sys
windows10-2004-x64
1Valorant-S...id.exe
windows10-2004-x64
7Valorant-S...de.sys
windows10-2004-x64
1Valorant-S...64.sys
windows10-2004-x64
1Valorant-S...er.bat
windows10-2004-x64
1Valorant-S...ad.bat
windows10-2004-x64
8Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
Valorant-Spoofer-main/AMIDEWINx64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Valorant-Spoofer-main/FN.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Valorant-Spoofer-main/Fortnite.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Valorant-Spoofer-main/Fortnite2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Valorant-Spoofer-main/Fortnite3.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Valorant-Spoofer-main/Fortnite4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Valorant-Spoofer-main/MapperSpoofy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Valorant-Spoofer-main/Registry.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Valorant-Spoofer-main/Spoofy.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Valorant-Spoofer-main/Volumeid.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Valorant-Spoofer-main/amide.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Valorant-Spoofer-main/amifldrv64.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Valorant-Spoofer-main/cleaner.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Valorant-Spoofer-main/load.bat
Resource
win10v2004-20240709-en
General
-
Target
Valorant-Spoofer-main/cleaner.bat
-
Size
66KB
-
MD5
4aca184cc1e5b9e8cb055ed2ea681bc5
-
SHA1
084860a5d88e11b99470629a8b1f5d2014386327
-
SHA256
91235345c54119fb6b4b36eb2cec8bb26103de3e8c5dfc0280e403b4a017d1f4
-
SHA512
e9e613173811457fb6417dc72288d7ec6b789c7f7445ce1d4b57e7c794a0537471f62802f48a14f87ebf918195d801e88aaa0a0aa6a45ce97ad41fbf06ac9477
-
SSDEEP
768:JSNLKYxq7zQz+TS4LKYx7az+J7qS4LioPdaz+e77JS4LioPAaz+iNf7P:FyvHeFxIabf7P
Malware Config
Signatures
-
Kills process with taskkill 5 IoCs
pid Process 904 taskkill.exe 4940 taskkill.exe 1092 taskkill.exe 848 taskkill.exe 1680 taskkill.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4872 reg.exe 5004 reg.exe 4960 reg.exe 3248 reg.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 848 taskkill.exe Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 904 taskkill.exe Token: SeDebugPrivilege 4940 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3928 wrote to memory of 848 3928 cmd.exe 84 PID 3928 wrote to memory of 848 3928 cmd.exe 84 PID 3928 wrote to memory of 1680 3928 cmd.exe 87 PID 3928 wrote to memory of 1680 3928 cmd.exe 87 PID 3928 wrote to memory of 904 3928 cmd.exe 88 PID 3928 wrote to memory of 904 3928 cmd.exe 88 PID 3928 wrote to memory of 4940 3928 cmd.exe 89 PID 3928 wrote to memory of 4940 3928 cmd.exe 89 PID 3928 wrote to memory of 1092 3928 cmd.exe 91 PID 3928 wrote to memory of 1092 3928 cmd.exe 91 PID 3928 wrote to memory of 4960 3928 cmd.exe 93 PID 3928 wrote to memory of 4960 3928 cmd.exe 93 PID 3928 wrote to memory of 3248 3928 cmd.exe 94 PID 3928 wrote to memory of 3248 3928 cmd.exe 94 PID 3928 wrote to memory of 4872 3928 cmd.exe 95 PID 3928 wrote to memory of 4872 3928 cmd.exe 95 PID 3928 wrote to memory of 5004 3928 cmd.exe 96 PID 3928 wrote to memory of 5004 3928 cmd.exe 96 PID 3928 wrote to memory of 3876 3928 cmd.exe 97 PID 3928 wrote to memory of 3876 3928 cmd.exe 97 PID 3928 wrote to memory of 3016 3928 cmd.exe 98 PID 3928 wrote to memory of 3016 3928 cmd.exe 98 PID 3928 wrote to memory of 4540 3928 cmd.exe 99 PID 3928 wrote to memory of 4540 3928 cmd.exe 99 PID 3928 wrote to memory of 4124 3928 cmd.exe 100 PID 3928 wrote to memory of 4124 3928 cmd.exe 100 PID 3928 wrote to memory of 2208 3928 cmd.exe 101 PID 3928 wrote to memory of 2208 3928 cmd.exe 101 PID 3928 wrote to memory of 2924 3928 cmd.exe 102 PID 3928 wrote to memory of 2924 3928 cmd.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\cleaner.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {26957-5679-29234-28768} /f2⤵
- Modifies registry key
PID:4960
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {20645-11033-18148-23355} /f2⤵
- Modifies registry key
PID:3248
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 27522-1398-32560-884 /f2⤵
- Modifies registry key
PID:4872
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d 2493-18255-16454-6028 /f2⤵
- Modifies registry key
PID:5004
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:3876
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\com.epicgames.launcher" /f2⤵PID:3016
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EpicGames" /f2⤵PID:4540
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Epic Games" /f2⤵PID:4124
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CLASSES_ROOT\com.epicgames.launcher" /f2⤵PID:2208
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:2924
-