Overview
overview
9Static
static
7lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...ht.bat
windows7-x64
8lcb spoofe...ht.bat
windows10-2004-x64
8lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
9lcb spoofe...er.bat
windows10-2004-x64
9lcb spoofe...er.exe
windows7-x64
9lcb spoofe...er.exe
windows10-2004-x64
9lcb spoofe...n1.bat
windows7-x64
7lcb spoofe...n1.bat
windows10-2004-x64
5lcb spoofe...n2.bat
windows7-x64
8lcb spoofe...n2.bat
windows10-2004-x64
8lcb spoofe...n3.bat
windows7-x64
7lcb spoofe...n3.bat
windows10-2004-x64
1lcb spoofe...AC.bat
windows7-x64
4lcb spoofe...AC.bat
windows10-2004-x64
4lcb spoofe...up.exe
windows7-x64
3lcb spoofe...up.exe
windows10-2004-x64
3lcb spoofe...ck.exe
windows7-x64
1lcb spoofe...ck.exe
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:28
Behavioral task
behavioral1
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win10v2004-20241007-en
General
-
Target
lcb spoofer_updated_quack/Serial Checker.bat
-
Size
831B
-
MD5
119a816fb17e3c634deda5fa650bbb50
-
SHA1
ee6fbcfe647a2b943e991797b08e10e2dd9eef5f
-
SHA256
8e04607e18f90a99e360f4bffe37102b20006143859c87ae845694512b41094f
-
SHA512
78d69503835da46a427afb50fd3dcb7d0dc246b89751d42533afb8bf8a0a0e5f78f78d350507460b5b421af0ae4b822ee2a435ab1962bf411fa5d94a663d6e2d
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2948 WMIC.exe Token: SeSecurityPrivilege 2948 WMIC.exe Token: SeTakeOwnershipPrivilege 2948 WMIC.exe Token: SeLoadDriverPrivilege 2948 WMIC.exe Token: SeSystemProfilePrivilege 2948 WMIC.exe Token: SeSystemtimePrivilege 2948 WMIC.exe Token: SeProfSingleProcessPrivilege 2948 WMIC.exe Token: SeIncBasePriorityPrivilege 2948 WMIC.exe Token: SeCreatePagefilePrivilege 2948 WMIC.exe Token: SeBackupPrivilege 2948 WMIC.exe Token: SeRestorePrivilege 2948 WMIC.exe Token: SeShutdownPrivilege 2948 WMIC.exe Token: SeDebugPrivilege 2948 WMIC.exe Token: SeSystemEnvironmentPrivilege 2948 WMIC.exe Token: SeRemoteShutdownPrivilege 2948 WMIC.exe Token: SeUndockPrivilege 2948 WMIC.exe Token: SeManageVolumePrivilege 2948 WMIC.exe Token: 33 2948 WMIC.exe Token: 34 2948 WMIC.exe Token: 35 2948 WMIC.exe Token: SeIncreaseQuotaPrivilege 2948 WMIC.exe Token: SeSecurityPrivilege 2948 WMIC.exe Token: SeTakeOwnershipPrivilege 2948 WMIC.exe Token: SeLoadDriverPrivilege 2948 WMIC.exe Token: SeSystemProfilePrivilege 2948 WMIC.exe Token: SeSystemtimePrivilege 2948 WMIC.exe Token: SeProfSingleProcessPrivilege 2948 WMIC.exe Token: SeIncBasePriorityPrivilege 2948 WMIC.exe Token: SeCreatePagefilePrivilege 2948 WMIC.exe Token: SeBackupPrivilege 2948 WMIC.exe Token: SeRestorePrivilege 2948 WMIC.exe Token: SeShutdownPrivilege 2948 WMIC.exe Token: SeDebugPrivilege 2948 WMIC.exe Token: SeSystemEnvironmentPrivilege 2948 WMIC.exe Token: SeRemoteShutdownPrivilege 2948 WMIC.exe Token: SeUndockPrivilege 2948 WMIC.exe Token: SeManageVolumePrivilege 2948 WMIC.exe Token: 33 2948 WMIC.exe Token: 34 2948 WMIC.exe Token: 35 2948 WMIC.exe Token: SeIncreaseQuotaPrivilege 1576 WMIC.exe Token: SeSecurityPrivilege 1576 WMIC.exe Token: SeTakeOwnershipPrivilege 1576 WMIC.exe Token: SeLoadDriverPrivilege 1576 WMIC.exe Token: SeSystemProfilePrivilege 1576 WMIC.exe Token: SeSystemtimePrivilege 1576 WMIC.exe Token: SeProfSingleProcessPrivilege 1576 WMIC.exe Token: SeIncBasePriorityPrivilege 1576 WMIC.exe Token: SeCreatePagefilePrivilege 1576 WMIC.exe Token: SeBackupPrivilege 1576 WMIC.exe Token: SeRestorePrivilege 1576 WMIC.exe Token: SeShutdownPrivilege 1576 WMIC.exe Token: SeDebugPrivilege 1576 WMIC.exe Token: SeSystemEnvironmentPrivilege 1576 WMIC.exe Token: SeRemoteShutdownPrivilege 1576 WMIC.exe Token: SeUndockPrivilege 1576 WMIC.exe Token: SeManageVolumePrivilege 1576 WMIC.exe Token: 33 1576 WMIC.exe Token: 34 1576 WMIC.exe Token: 35 1576 WMIC.exe Token: SeIncreaseQuotaPrivilege 1576 WMIC.exe Token: SeSecurityPrivilege 1576 WMIC.exe Token: SeTakeOwnershipPrivilege 1576 WMIC.exe Token: SeLoadDriverPrivilege 1576 WMIC.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
cmd.exedescription pid process target process PID 2244 wrote to memory of 2944 2244 cmd.exe mode.com PID 2244 wrote to memory of 2944 2244 cmd.exe mode.com PID 2244 wrote to memory of 2944 2244 cmd.exe mode.com PID 2244 wrote to memory of 2948 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2948 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2948 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1576 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1576 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1576 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2804 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2804 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2804 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2940 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2940 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2940 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2700 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2700 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2700 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2160 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2160 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2160 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2172 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2172 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2172 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 572 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 572 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 572 2244 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\lcb spoofer_updated_quack\Serial Checker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\mode.commode con: cols=180 lines=622⤵PID:2944
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid2⤵PID:2804
-
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description,PNPDeviceID2⤵PID:2940
-
-
C:\Windows\System32\Wbem\WMIC.exewmic memorychip get serialnumber2⤵PID:2700
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid2⤵PID:2160
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get processorid2⤵PID:2172
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress2⤵PID:572
-