Overview
overview
10Static
static
3Valorant-S...64.exe
windows10-2004-x64
1Valorant-S...FN.bat
windows10-2004-x64
7Valorant-S...te.bat
windows10-2004-x64
7Valorant-S...e2.bat
windows10-2004-x64
1Valorant-S...e3.bat
windows10-2004-x64
8Valorant-S...e4.exe
windows10-2004-x64
10Valorant-S...fy.exe
windows10-2004-x64
5Valorant-S...ry.bat
windows10-2004-x64
1Valorant-S...fy.sys
windows10-2004-x64
1Valorant-S...id.exe
windows10-2004-x64
7Valorant-S...de.sys
windows10-2004-x64
1Valorant-S...64.sys
windows10-2004-x64
1Valorant-S...er.bat
windows10-2004-x64
1Valorant-S...ad.bat
windows10-2004-x64
8Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
Valorant-Spoofer-main/AMIDEWINx64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Valorant-Spoofer-main/FN.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Valorant-Spoofer-main/Fortnite.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Valorant-Spoofer-main/Fortnite2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Valorant-Spoofer-main/Fortnite3.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Valorant-Spoofer-main/Fortnite4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Valorant-Spoofer-main/MapperSpoofy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Valorant-Spoofer-main/Registry.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Valorant-Spoofer-main/Spoofy.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Valorant-Spoofer-main/Volumeid.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Valorant-Spoofer-main/amide.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Valorant-Spoofer-main/amifldrv64.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Valorant-Spoofer-main/cleaner.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Valorant-Spoofer-main/load.bat
Resource
win10v2004-20240709-en
General
-
Target
Valorant-Spoofer-main/Fortnite.bat
-
Size
30KB
-
MD5
8c6fb606eea8df99f458eaf8d7015f08
-
SHA1
7c4238441b4678ce3e316654995503f827caecce
-
SHA256
fa714d3279efc5deea540bf9d96aebd6c0e813695e24de97f22f7953ba92eb8d
-
SHA512
f649e65a2953a88b4e0d0c3b89f5fb61eb17fea2aa6a35f3674ba18dbb4aed148e5a4be8df6a06226140f99c63b12cc91d83531754a33838b05c6d04afe229a2
-
SSDEEP
384:2i/Vo6d/s16JjVAJ9OSU5RCn3I3ktLioPpnRz+rV5pK/F23aKVed+NUSepyw98Wh:2KKS4LioPdRz+pnfxh94
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\INF\prnms012.inf cmd.exe File opened for modification C:\Windows\INF\SmartSAMD.inf cmd.exe File opened for modification C:\Windows\INF\BITS\0410\bitsctrs.ini cmd.exe File opened for modification C:\Windows\INF\BITS\0C0A\bitsctrs.ini cmd.exe File opened for modification C:\Windows\INF\MSDTC\0410\msdtcprf.ini cmd.exe File opened for modification C:\Windows\INF\net1ic64.inf cmd.exe File opened for modification C:\Windows\INF\oposdrv.inf cmd.exe File opened for modification C:\Windows\INF\.NET Data Provider for SqlServer\_dataperfcounters_shared12_neutral.ini cmd.exe File opened for modification C:\Windows\INF\bthspp.inf cmd.exe File opened for modification C:\Windows\INF\fontsetup.inf cmd.exe File opened for modification C:\Windows\INF\usbvideo.inf cmd.exe File opened for modification C:\Windows\INF\wvmbusvideo.inf cmd.exe File opened for modification C:\Windows\INF\c_floppydisk.inf cmd.exe File opened for modification C:\Windows\INF\dc21x4vm.inf cmd.exe File opened for modification C:\Windows\INF\dshowext.inf cmd.exe File opened for modification C:\Windows\INF\wgencounter.inf cmd.exe File opened for modification C:\Windows\INF\c_swdevice.inf cmd.exe File opened for modification C:\Windows\INF\mdmsier.inf cmd.exe File opened for modification C:\Windows\INF\netvwwanmp.inf cmd.exe File opened for modification C:\Windows\INF\TermService\0407\tslabels.ini cmd.exe File opened for modification C:\Windows\INF\fusionv2.inf cmd.exe File opened for modification C:\Windows\INF\mdmomrn3.inf cmd.exe File opened for modification C:\Windows\INF\megasas35i.inf cmd.exe File opened for modification C:\Windows\INF\RemoteAccess\0409\rasctrs.ini cmd.exe File opened for modification C:\Windows\INF\scsidev.inf cmd.exe File opened for modification C:\Windows\INF\rndiscmp.inf cmd.exe File opened for modification C:\Windows\INF\TAPISRV\0410\tapiperf.ini cmd.exe File opened for modification C:\Windows\INF\MSDTC\0000\msdtcprf.ini cmd.exe File opened for modification C:\Windows\INF\net44amd.inf cmd.exe File opened for modification C:\Windows\INF\netbvbda.inf cmd.exe File opened for modification C:\Windows\INF\netk57a.inf cmd.exe File opened for modification C:\Windows\INF\netxex64.inf cmd.exe File opened for modification C:\Windows\INF\LSM\0411\lagcounterdef.ini cmd.exe File opened for modification C:\Windows\INF\machine.inf cmd.exe File opened for modification C:\Windows\INF\prnms014.inf cmd.exe File opened for modification C:\Windows\INF\wvmgid.inf cmd.exe File opened for modification C:\Windows\INF\c_biometric.inf cmd.exe File opened for modification C:\Windows\INF\dc1-controller.inf cmd.exe File opened for modification C:\Windows\INF\WINDOW~1.0\0409\PerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\c_sbp2.inf cmd.exe File opened for modification C:\Windows\INF\scrawpdo.inf cmd.exe File opened for modification C:\Windows\INF\sensorsalsdriver.inf cmd.exe File opened for modification C:\Windows\INF\SMSvcHost 4.0.0.0\040C\_SMSvcHostPerfCounters_d.ini cmd.exe File opened for modification C:\Windows\INF\acpipagr.inf cmd.exe File opened for modification C:\Windows\INF\tsgenericusbdriver.inf cmd.exe File opened for modification C:\Windows\INF\c_scmdisk.inf cmd.exe File opened for modification C:\Windows\INF\c_smartcard.inf cmd.exe File opened for modification C:\Windows\INF\megasas2i.inf cmd.exe File opened for modification C:\Windows\INF\c_fsundelete.inf cmd.exe File opened for modification C:\Windows\INF\mdmcxpv6.inf cmd.exe File opened for modification C:\Windows\INF\netvf63a.inf cmd.exe File opened for modification C:\Windows\INF\SERVIC~1.0\0410\_ServiceModelEndpointPerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\TAPISRV\0407\tapiperf.ini cmd.exe File opened for modification C:\Windows\INF\dwup.inf cmd.exe File opened for modification C:\Windows\INF\mdmcpq.inf cmd.exe File opened for modification C:\Windows\INF\usbhub\040C\usbperf.ini cmd.exe File opened for modification C:\Windows\INF\acpitime.inf cmd.exe File opened for modification C:\Windows\INF\ESENT\0C0A\esentprf.ini cmd.exe File opened for modification C:\Windows\INF\mdmcom1.inf cmd.exe File opened for modification C:\Windows\INF\mdmcrtix.inf cmd.exe File opened for modification C:\Windows\INF\SERVIC~2.0\0411\_ServiceModelOperationPerfCounters_D.ini cmd.exe File opened for modification C:\Windows\INF\modemcsa.inf cmd.exe File opened for modification C:\Windows\INF\acpi.inf cmd.exe File opened for modification C:\Windows\INF\c_netdriver.inf cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 1600 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1076 reg.exe 3552 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2496 2952 cmd.exe 84 PID 2952 wrote to memory of 2496 2952 cmd.exe 84 PID 2952 wrote to memory of 928 2952 cmd.exe 85 PID 2952 wrote to memory of 928 2952 cmd.exe 85 PID 2952 wrote to memory of 4048 2952 cmd.exe 87 PID 2952 wrote to memory of 4048 2952 cmd.exe 87 PID 2952 wrote to memory of 1076 2952 cmd.exe 88 PID 2952 wrote to memory of 1076 2952 cmd.exe 88 PID 2952 wrote to memory of 3552 2952 cmd.exe 89 PID 2952 wrote to memory of 3552 2952 cmd.exe 89 PID 2952 wrote to memory of 1116 2952 cmd.exe 90 PID 2952 wrote to memory of 1116 2952 cmd.exe 90 PID 2952 wrote to memory of 1684 2952 cmd.exe 91 PID 2952 wrote to memory of 1684 2952 cmd.exe 91 PID 2952 wrote to memory of 4756 2952 cmd.exe 92 PID 2952 wrote to memory of 4756 2952 cmd.exe 92 PID 2952 wrote to memory of 1600 2952 cmd.exe 93 PID 2952 wrote to memory of 1600 2952 cmd.exe 93 PID 2952 wrote to memory of 2884 2952 cmd.exe 97 PID 2952 wrote to memory of 2884 2952 cmd.exe 97 PID 2952 wrote to memory of 3748 2952 cmd.exe 98 PID 2952 wrote to memory of 3748 2952 cmd.exe 98 PID 2952 wrote to memory of 392 2952 cmd.exe 99 PID 2952 wrote to memory of 392 2952 cmd.exe 99 PID 2952 wrote to memory of 1324 2952 cmd.exe 100 PID 2952 wrote to memory of 1324 2952 cmd.exe 100 PID 2952 wrote to memory of 4820 2952 cmd.exe 101 PID 2952 wrote to memory of 4820 2952 cmd.exe 101 PID 2952 wrote to memory of 3756 2952 cmd.exe 102 PID 2952 wrote to memory of 3756 2952 cmd.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Fortnite.bat"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:2496
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:928
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:4048
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d 26957 /f2⤵
- Modifies registry key
PID:1076
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d 5679 /f2⤵
- Modifies registry key
PID:3552
-
-
C:\Windows\system32\reg.exereg delete"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\WMI\Security\" /f2⤵PID:1116
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Hardware Survey" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /f2⤵PID:4756
-
-
C:\Windows\system32\taskkill.exetaskkill /IM "EpicGamesLauncher.exe" /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-2097722829-2509645790-3642206209-1001\Software\Epic Games" /f2⤵PID:2884
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig" /f2⤵PID:3748
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:392
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:1324
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:4820
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:3756
-