Overview
overview
9Static
static
7lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...ht.bat
windows7-x64
8lcb spoofe...ht.bat
windows10-2004-x64
8lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
9lcb spoofe...er.bat
windows10-2004-x64
9lcb spoofe...er.exe
windows7-x64
9lcb spoofe...er.exe
windows10-2004-x64
9lcb spoofe...n1.bat
windows7-x64
7lcb spoofe...n1.bat
windows10-2004-x64
5lcb spoofe...n2.bat
windows7-x64
8lcb spoofe...n2.bat
windows10-2004-x64
8lcb spoofe...n3.bat
windows7-x64
7lcb spoofe...n3.bat
windows10-2004-x64
1lcb spoofe...AC.bat
windows7-x64
4lcb spoofe...AC.bat
windows10-2004-x64
4lcb spoofe...up.exe
windows7-x64
3lcb spoofe...up.exe
windows10-2004-x64
3lcb spoofe...ck.exe
windows7-x64
1lcb spoofe...ck.exe
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:28
Behavioral task
behavioral1
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win10v2004-20241007-en
General
-
Target
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
-
Size
260KB
-
MD5
049fce145abfed6afa90599762b08c6b
-
SHA1
563036667eb0a743c138f9f245cabfffe07c424e
-
SHA256
97377c7ae3ff41e72dac718a4dd82cdd079ff50e026ce159d3435e6edb8bc543
-
SHA512
e610806fbbf5365370538a1055637b5bf3ae9ae09f8779c1289b7800a9472f4f95db051c15c21af45bb70bfb99d2ef59846814ad36d8ecb6cd31c73e7dc443bb
-
SSDEEP
1536:gWNoZxBOz2ouKKCWZr3PwUWg28361L5LvLpLjL5Azf4oH9Yzf4gH9c:gbKKCWCUWg284oH9Q4gH9c
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2648 cmd.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 528 sc.exe 2728 sc.exe 2924 sc.exe 776 sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Kills process with taskkill 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 648 taskkill.exe 2152 taskkill.exe 2564 taskkill.exe 560 taskkill.exe 2740 taskkill.exe 2712 taskkill.exe 2840 taskkill.exe 2976 taskkill.exe 2120 taskkill.exe 2144 taskkill.exe 2596 taskkill.exe 2980 taskkill.exe 2080 taskkill.exe 3040 taskkill.exe 2680 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid Process Token: SeDebugPrivilege 3040 taskkill.exe Token: SeDebugPrivilege 2840 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 2680 taskkill.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 2564 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 560 taskkill.exe Token: SeDebugPrivilege 648 taskkill.exe Token: SeDebugPrivilege 2980 taskkill.exe Token: SeDebugPrivilege 2152 taskkill.exe Token: SeDebugPrivilege 2120 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2648 wrote to memory of 2792 2648 cmd.exe 32 PID 2648 wrote to memory of 2792 2648 cmd.exe 32 PID 2648 wrote to memory of 2792 2648 cmd.exe 32 PID 2648 wrote to memory of 3040 2648 cmd.exe 33 PID 2648 wrote to memory of 3040 2648 cmd.exe 33 PID 2648 wrote to memory of 3040 2648 cmd.exe 33 PID 2648 wrote to memory of 2840 2648 cmd.exe 35 PID 2648 wrote to memory of 2840 2648 cmd.exe 35 PID 2648 wrote to memory of 2840 2648 cmd.exe 35 PID 2648 wrote to memory of 2976 2648 cmd.exe 36 PID 2648 wrote to memory of 2976 2648 cmd.exe 36 PID 2648 wrote to memory of 2976 2648 cmd.exe 36 PID 2648 wrote to memory of 2680 2648 cmd.exe 37 PID 2648 wrote to memory of 2680 2648 cmd.exe 37 PID 2648 wrote to memory of 2680 2648 cmd.exe 37 PID 2648 wrote to memory of 2740 2648 cmd.exe 38 PID 2648 wrote to memory of 2740 2648 cmd.exe 38 PID 2648 wrote to memory of 2740 2648 cmd.exe 38 PID 2648 wrote to memory of 2564 2648 cmd.exe 39 PID 2648 wrote to memory of 2564 2648 cmd.exe 39 PID 2648 wrote to memory of 2564 2648 cmd.exe 39 PID 2648 wrote to memory of 2712 2648 cmd.exe 40 PID 2648 wrote to memory of 2712 2648 cmd.exe 40 PID 2648 wrote to memory of 2712 2648 cmd.exe 40 PID 2648 wrote to memory of 2596 2648 cmd.exe 41 PID 2648 wrote to memory of 2596 2648 cmd.exe 41 PID 2648 wrote to memory of 2596 2648 cmd.exe 41 PID 2648 wrote to memory of 560 2648 cmd.exe 42 PID 2648 wrote to memory of 560 2648 cmd.exe 42 PID 2648 wrote to memory of 560 2648 cmd.exe 42 PID 2648 wrote to memory of 648 2648 cmd.exe 43 PID 2648 wrote to memory of 648 2648 cmd.exe 43 PID 2648 wrote to memory of 648 2648 cmd.exe 43 PID 2648 wrote to memory of 2980 2648 cmd.exe 44 PID 2648 wrote to memory of 2980 2648 cmd.exe 44 PID 2648 wrote to memory of 2980 2648 cmd.exe 44 PID 2648 wrote to memory of 2152 2648 cmd.exe 45 PID 2648 wrote to memory of 2152 2648 cmd.exe 45 PID 2648 wrote to memory of 2152 2648 cmd.exe 45 PID 2648 wrote to memory of 2120 2648 cmd.exe 46 PID 2648 wrote to memory of 2120 2648 cmd.exe 46 PID 2648 wrote to memory of 2120 2648 cmd.exe 46 PID 2648 wrote to memory of 2080 2648 cmd.exe 47 PID 2648 wrote to memory of 2080 2648 cmd.exe 47 PID 2648 wrote to memory of 2080 2648 cmd.exe 47 PID 2648 wrote to memory of 2144 2648 cmd.exe 48 PID 2648 wrote to memory of 2144 2648 cmd.exe 48 PID 2648 wrote to memory of 2144 2648 cmd.exe 48 PID 2648 wrote to memory of 776 2648 cmd.exe 49 PID 2648 wrote to memory of 776 2648 cmd.exe 49 PID 2648 wrote to memory of 776 2648 cmd.exe 49 PID 2648 wrote to memory of 528 2648 cmd.exe 50 PID 2648 wrote to memory of 528 2648 cmd.exe 50 PID 2648 wrote to memory of 528 2648 cmd.exe 50 PID 2648 wrote to memory of 2728 2648 cmd.exe 51 PID 2648 wrote to memory of 2728 2648 cmd.exe 51 PID 2648 wrote to memory of 2728 2648 cmd.exe 51 PID 2648 wrote to memory of 2924 2648 cmd.exe 52 PID 2648 wrote to memory of 2924 2648 cmd.exe 52 PID 2648 wrote to memory of 2924 2648 cmd.exe 52
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\lcb spoofer_updated_quack\cleaners\leakedshit\clean2.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2792
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im PerfWatson2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im vgtray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:776
-
-
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_EAC2⤵
- Launches sc.exe
- System Network Configuration Discovery: Internet Connection Discovery
PID:528
-
-
C:\Windows\system32\sc.exeSc stop BattleEye2⤵
- Launches sc.exe
PID:2728
-
-
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_BE2⤵
- Launches sc.exe
- System Network Configuration Discovery: Internet Connection Discovery
PID:2924
-