Overview
overview
10Static
static
3Valorant-S...64.exe
windows10-2004-x64
1Valorant-S...FN.bat
windows10-2004-x64
7Valorant-S...te.bat
windows10-2004-x64
7Valorant-S...e2.bat
windows10-2004-x64
1Valorant-S...e3.bat
windows10-2004-x64
8Valorant-S...e4.exe
windows10-2004-x64
10Valorant-S...fy.exe
windows10-2004-x64
5Valorant-S...ry.bat
windows10-2004-x64
1Valorant-S...fy.sys
windows10-2004-x64
1Valorant-S...id.exe
windows10-2004-x64
7Valorant-S...de.sys
windows10-2004-x64
1Valorant-S...64.sys
windows10-2004-x64
1Valorant-S...er.bat
windows10-2004-x64
1Valorant-S...ad.bat
windows10-2004-x64
8Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
Valorant-Spoofer-main/AMIDEWINx64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Valorant-Spoofer-main/FN.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Valorant-Spoofer-main/Fortnite.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Valorant-Spoofer-main/Fortnite2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Valorant-Spoofer-main/Fortnite3.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Valorant-Spoofer-main/Fortnite4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Valorant-Spoofer-main/MapperSpoofy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Valorant-Spoofer-main/Registry.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Valorant-Spoofer-main/Spoofy.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Valorant-Spoofer-main/Volumeid.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Valorant-Spoofer-main/amide.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Valorant-Spoofer-main/amifldrv64.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Valorant-Spoofer-main/cleaner.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Valorant-Spoofer-main/load.bat
Resource
win10v2004-20240709-en
General
-
Target
Valorant-Spoofer-main/FN.bat
-
Size
30KB
-
MD5
8606f9785d32bf6a4700b1e544c8b170
-
SHA1
7f6c679831520aa248505ee9a19f8019dde21e3c
-
SHA256
1f008e7e3df9d5017d8cb893395fd08ef15bd45ea857f988c3aded86112d6f26
-
SHA512
b93f8efc55a393facb32d39fc9eb6d9811b80a358b36a9789a3cffe6526bc4ab957fe13144a98fda1140f4fdefdcabf87101382ff5cecfc3a9bf2bd673d44bcf
-
SSDEEP
384:29/Vo6d/s16JjVAJ9OSU5RCn3I3ktLioPpnRz+rV5pK/F23aKVed+NUSepyw98Wh:2DKS4LioPdRz+pnfxh94
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\INF\.NET CLR Networking\0000\_Networkingperfcounters_v2_d.ini cmd.exe File opened for modification C:\Windows\INF\mdmcxpv6.inf cmd.exe File opened for modification C:\Windows\INF\iaLPSS2i_GPIO2_GLK.inf cmd.exe File opened for modification C:\Windows\INF\.NET CLR Networking 4.0.0.0\0407\_Networkingperfcounters_d.ini cmd.exe File opened for modification C:\Windows\INF\c_hidclass.inf cmd.exe File opened for modification C:\Windows\INF\nett4x64.inf cmd.exe File opened for modification C:\Windows\INF\usbhub\0410\usbperf.ini cmd.exe File opened for modification C:\Windows\INF\.NET CLR Networking 4.0.0.0\_NetworkingPerfCounters.h cmd.exe File opened for modification C:\Windows\INF\c_wceusbs.inf cmd.exe File opened for modification C:\Windows\INF\c_memory.inf cmd.exe File opened for modification C:\Windows\INF\rdyboost\0000\ReadyBoostPerfCounters.ini cmd.exe File opened for modification C:\Windows\INF\wpdcomp.inf cmd.exe File opened for modification C:\Windows\INF\.NET Memory Cache 4.0\0410\netmemorycache_d.ini cmd.exe File opened for modification C:\Windows\INF\c_fssystemrecovery.inf cmd.exe File opened for modification C:\Windows\INF\net7400-x64-n650.inf cmd.exe File opened for modification C:\Windows\INF\wceisvista.inf cmd.exe File opened for modification C:\Windows\INF\b57nd60a.inf cmd.exe File opened for modification C:\Windows\INF\bcmfn2.inf cmd.exe File opened for modification C:\Windows\INF\mdmgl005.inf cmd.exe File opened for modification C:\Windows\INF\netloop.inf cmd.exe File opened for modification C:\Windows\INF\smrdisk.inf cmd.exe File opened for modification C:\Windows\INF\.NET CLR Networking\_NetworkingPerfCounters_v2.h cmd.exe File opened for modification C:\Windows\INF\c_holographic.inf cmd.exe File opened for modification C:\Windows\INF\MSDTC\0410\msdtcprf.ini cmd.exe File opened for modification C:\Windows\INF\netv1x64.inf cmd.exe File opened for modification C:\Windows\INF\ESENT\0000\esentprf.ini cmd.exe File opened for modification C:\Windows\INF\mdmmhzel.inf cmd.exe File opened for modification C:\Windows\INF\mdmnis3t.inf cmd.exe File opened for modification C:\Windows\INF\MSDTC\msdtcprf.h cmd.exe File opened for modification C:\Windows\INF\tape.inf cmd.exe File opened for modification C:\Windows\INF\kscaptur.inf cmd.exe File opened for modification C:\Windows\INF\ts_generic.inf cmd.exe File opened for modification C:\Windows\INF\c_display.inf cmd.exe File opened for modification C:\Windows\INF\c_pnpprinters.inf cmd.exe File opened for modification C:\Windows\INF\fontsetup.inf cmd.exe File opened for modification C:\Windows\INF\ks.inf cmd.exe File opened for modification C:\Windows\INF\mdmaiwa4.inf cmd.exe File opened for modification C:\Windows\INF\.NETFramework\0410\corperfmonsymbols_d.ini cmd.exe File opened for modification C:\Windows\INF\halextintclpiodma.inf cmd.exe File opened for modification C:\Windows\INF\mdmaiwa3.inf cmd.exe File opened for modification C:\Windows\INF\netvwwanmp.inf cmd.exe File opened for modification C:\Windows\INF\scmvolume.inf cmd.exe File opened for modification C:\Windows\INF\circlass.inf cmd.exe File opened for modification C:\Windows\INF\mdmsii64.inf cmd.exe File opened for modification C:\Windows\INF\prnms010.inf cmd.exe File opened for modification C:\Windows\INF\TermService\0410\tslabels.ini cmd.exe File opened for modification C:\Windows\INF\.NETFramework\CORPerfMonSymbols.h cmd.exe File opened for modification C:\Windows\INF\MSDTCB~1.0\040C\_TransactionBridgePerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\SMSVCH~1.0\0C0A\_SMSvcHostPerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\mdmhaeu.inf cmd.exe File opened for modification C:\Windows\INF\mdmtdk.inf cmd.exe File opened for modification C:\Windows\INF\mdmdcm6.inf cmd.exe File opened for modification C:\Windows\INF\mdmnttd2.inf cmd.exe File opened for modification C:\Windows\INF\rtvdevx64.inf cmd.exe File opened for modification C:\Windows\INF\wsearchidxpi\idxcntrs.h cmd.exe File opened for modification C:\Windows\INF\hiddigi.inf cmd.exe File opened for modification C:\Windows\INF\MSDTC Bridge 4.0.0.0\0410\_TransactionBridgePerfCounters_d.ini cmd.exe File opened for modification C:\Windows\INF\net7800-x64-n650f.inf cmd.exe File opened for modification C:\Windows\INF\c_smartcardreader.inf cmd.exe File opened for modification C:\Windows\INF\pmem.inf cmd.exe File opened for modification C:\Windows\INF\wgencounter.inf cmd.exe File opened for modification C:\Windows\INF\mdmpsion.inf cmd.exe File opened for modification C:\Windows\INF\percsas2i.inf cmd.exe File opened for modification C:\Windows\INF\usbhub\0407\usbperf.ini cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 3768 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1940 reg.exe 4560 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3768 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4492 wrote to memory of 3820 4492 cmd.exe 84 PID 4492 wrote to memory of 3820 4492 cmd.exe 84 PID 4492 wrote to memory of 3216 4492 cmd.exe 86 PID 4492 wrote to memory of 3216 4492 cmd.exe 86 PID 4492 wrote to memory of 3728 4492 cmd.exe 87 PID 4492 wrote to memory of 3728 4492 cmd.exe 87 PID 4492 wrote to memory of 1940 4492 cmd.exe 88 PID 4492 wrote to memory of 1940 4492 cmd.exe 88 PID 4492 wrote to memory of 4560 4492 cmd.exe 89 PID 4492 wrote to memory of 4560 4492 cmd.exe 89 PID 4492 wrote to memory of 4860 4492 cmd.exe 90 PID 4492 wrote to memory of 4860 4492 cmd.exe 90 PID 4492 wrote to memory of 1068 4492 cmd.exe 91 PID 4492 wrote to memory of 1068 4492 cmd.exe 91 PID 4492 wrote to memory of 4728 4492 cmd.exe 92 PID 4492 wrote to memory of 4728 4492 cmd.exe 92 PID 4492 wrote to memory of 3768 4492 cmd.exe 93 PID 4492 wrote to memory of 3768 4492 cmd.exe 93 PID 4492 wrote to memory of 3632 4492 cmd.exe 97 PID 4492 wrote to memory of 3632 4492 cmd.exe 97 PID 4492 wrote to memory of 676 4492 cmd.exe 98 PID 4492 wrote to memory of 676 4492 cmd.exe 98 PID 4492 wrote to memory of 5096 4492 cmd.exe 99 PID 4492 wrote to memory of 5096 4492 cmd.exe 99 PID 4492 wrote to memory of 2896 4492 cmd.exe 100 PID 4492 wrote to memory of 2896 4492 cmd.exe 100 PID 4492 wrote to memory of 2556 4492 cmd.exe 101 PID 4492 wrote to memory of 2556 4492 cmd.exe 101 PID 4492 wrote to memory of 4332 4492 cmd.exe 102 PID 4492 wrote to memory of 4332 4492 cmd.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\FN.bat"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:3820
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:3216
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:3728
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d 26961 /f2⤵
- Modifies registry key
PID:1940
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d 16428 /f2⤵
- Modifies registry key
PID:4560
-
-
C:\Windows\system32\reg.exereg delete"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\WMI\Security\" /f2⤵PID:4860
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:1068
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:4728
-
-
C:\Windows\system32\taskkill.exetaskkill /IM "EpicGamesLauncher.exe" /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-2097722829-2509645790-3642206209-1001\Software\Epic Games" /f2⤵PID:3632
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig" /f2⤵PID:676
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:5096
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:2896
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:2556
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:4332
-