Analysis
-
max time kernel
48s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
ValorantExternalFree_[unknowncheats.me]_.exe
Resource
win10v2004-20240709-en
General
-
Target
ValorantExternalFree_[unknowncheats.me]_.exe
-
Size
808KB
-
MD5
4ac882ebdbc1431cdd3ab45e1712ada1
-
SHA1
b871304fd060b700fd66ce0c87014ec955d12979
-
SHA256
b13f23643fddce3f41b6908a00051b6688788668c81d698994c140bf6290c2d6
-
SHA512
f3ff8d00849289436b723bc48c14113e51b583955d7f69870458d7b7d72ba214ad531d601a950b247f43325a610fd15cd6584008fd842a29c1dd0804ee2e6f98
-
SSDEEP
24576:65MOrT+F0sIE9JqsC6mVFyCsffzMS6pcsP9Qtce0TBs/lPsoCyEbDb7Br5oANn90:+bjnS
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\sWpCaCMriryNxOPmPp\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\sWpCaCMriryNxOPmPp" ValorantExternalFree_[unknowncheats.me]_.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 376 chrome.exe 376 chrome.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe 4004 ValorantExternalFree_[unknowncheats.me]_.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4004 ValorantExternalFree_[unknowncheats.me]_.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeLoadDriverPrivilege 4004 ValorantExternalFree_[unknowncheats.me]_.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3808 4004 ValorantExternalFree_[unknowncheats.me]_.exe 86 PID 4004 wrote to memory of 3808 4004 ValorantExternalFree_[unknowncheats.me]_.exe 86 PID 4004 wrote to memory of 212 4004 ValorantExternalFree_[unknowncheats.me]_.exe 94 PID 4004 wrote to memory of 212 4004 ValorantExternalFree_[unknowncheats.me]_.exe 94 PID 4004 wrote to memory of 4068 4004 ValorantExternalFree_[unknowncheats.me]_.exe 96 PID 4004 wrote to memory of 4068 4004 ValorantExternalFree_[unknowncheats.me]_.exe 96 PID 4004 wrote to memory of 4952 4004 ValorantExternalFree_[unknowncheats.me]_.exe 97 PID 4004 wrote to memory of 4952 4004 ValorantExternalFree_[unknowncheats.me]_.exe 97 PID 4004 wrote to memory of 4768 4004 ValorantExternalFree_[unknowncheats.me]_.exe 98 PID 4004 wrote to memory of 4768 4004 ValorantExternalFree_[unknowncheats.me]_.exe 98 PID 4004 wrote to memory of 1812 4004 ValorantExternalFree_[unknowncheats.me]_.exe 100 PID 4004 wrote to memory of 1812 4004 ValorantExternalFree_[unknowncheats.me]_.exe 100 PID 4004 wrote to memory of 452 4004 ValorantExternalFree_[unknowncheats.me]_.exe 101 PID 4004 wrote to memory of 452 4004 ValorantExternalFree_[unknowncheats.me]_.exe 101 PID 4004 wrote to memory of 3988 4004 ValorantExternalFree_[unknowncheats.me]_.exe 103 PID 4004 wrote to memory of 3988 4004 ValorantExternalFree_[unknowncheats.me]_.exe 103 PID 4004 wrote to memory of 2744 4004 ValorantExternalFree_[unknowncheats.me]_.exe 104 PID 4004 wrote to memory of 2744 4004 ValorantExternalFree_[unknowncheats.me]_.exe 104 PID 4004 wrote to memory of 4332 4004 ValorantExternalFree_[unknowncheats.me]_.exe 105 PID 4004 wrote to memory of 4332 4004 ValorantExternalFree_[unknowncheats.me]_.exe 105 PID 4004 wrote to memory of 2956 4004 ValorantExternalFree_[unknowncheats.me]_.exe 106 PID 4004 wrote to memory of 2956 4004 ValorantExternalFree_[unknowncheats.me]_.exe 106 PID 4004 wrote to memory of 5092 4004 ValorantExternalFree_[unknowncheats.me]_.exe 107 PID 4004 wrote to memory of 5092 4004 ValorantExternalFree_[unknowncheats.me]_.exe 107 PID 4004 wrote to memory of 3900 4004 ValorantExternalFree_[unknowncheats.me]_.exe 108 PID 4004 wrote to memory of 3900 4004 ValorantExternalFree_[unknowncheats.me]_.exe 108 PID 4004 wrote to memory of 2328 4004 ValorantExternalFree_[unknowncheats.me]_.exe 109 PID 4004 wrote to memory of 2328 4004 ValorantExternalFree_[unknowncheats.me]_.exe 109 PID 376 wrote to memory of 3388 376 chrome.exe 113 PID 376 wrote to memory of 3388 376 chrome.exe 113 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 1076 376 chrome.exe 114 PID 376 wrote to memory of 4340 376 chrome.exe 115 PID 376 wrote to memory of 4340 376 chrome.exe 115 PID 376 wrote to memory of 4424 376 chrome.exe 116 PID 376 wrote to memory of 4424 376 chrome.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\ValorantExternalFree_[unknowncheats.me]_.exe"C:\Users\Admin\AppData\Local\Temp\ValorantExternalFree_[unknowncheats.me]_.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd0816cc40,0x7ffd0816cc4c,0x7ffd0816cc582⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2208 /prefetch:32⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3428,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4404,i,18208822351655960229,9479931763468657843,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58c14c4ed4f8c4f064ce0727a0c337d7e
SHA145cdbcc1c8519ace17d9067e5256523c4c815086
SHA2561d1db299191257e618fda95a28e7a65be1d3fa191b27cc92ccf84939678476a5
SHA512577d8fccae28299a50382571f6e49d5108fd29396d7f79adf55ab2e138c6fe776c14d9866e3289211c9f0e48edd0314477ff0b11985757dea793ac1f5e05581f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5421cf22b251484d4173b8549835b21af
SHA12debc21e0606a615e176541e05a40301a9576ad0
SHA256ca37526a5a753bba7266eec547723c34ebb8cc5c5aadc1c53049210688f8be63
SHA51288c649ebc9e79fc53ff9fa3cd381254d916c330991e0d5d8c3d5e355449ba826d9db47072d07fad32bf838a1866bce84a7842846086a1cd7b2c051f27a4749a3
-
Filesize
8KB
MD54b3f13c41466ae7dc6706ab554d77794
SHA1bfc6756f002df796dc576eb131094cb36f9a7cfa
SHA25627a4f6a29f9a51a7469d08859f71134e4de740bca6c30d46301772662405db25
SHA512b42e66a5c5fca99328922975599b4364d4321f65fce2aa9b0b88ef97d97408a5d77e3d318ccd7ec095d868ed4d3e6ed3cd59117597298451f64b6df2ea4a6d06
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
93KB
MD57d6f38a254fbac71cdeac658d523f34b
SHA16d42f201dbb875e2a98bfd8fd467a8ee9918861b
SHA25620d4d674e67ac125dfdfc6ca0ef269fa33a109b90ad2eef455e43b48889bc506
SHA512865f0d62e4be8ca0f82498fcca34fe97ae08c38a43926d64358e494155e54c62f392e26704e87ae7ced0d8e2d3726278b8ac80d19117e64c3267ef1e73880495