Overview
overview
9Static
static
7lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
1lcb spoofe...er.bat
windows10-2004-x64
1lcb spoofe...ht.bat
windows7-x64
8lcb spoofe...ht.bat
windows10-2004-x64
8lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.exe
windows7-x64
1lcb spoofe...er.exe
windows10-2004-x64
1lcb spoofe...er.bat
windows7-x64
9lcb spoofe...er.bat
windows10-2004-x64
9lcb spoofe...er.exe
windows7-x64
9lcb spoofe...er.exe
windows10-2004-x64
9lcb spoofe...n1.bat
windows7-x64
7lcb spoofe...n1.bat
windows10-2004-x64
5lcb spoofe...n2.bat
windows7-x64
8lcb spoofe...n2.bat
windows10-2004-x64
8lcb spoofe...n3.bat
windows7-x64
7lcb spoofe...n3.bat
windows10-2004-x64
1lcb spoofe...AC.bat
windows7-x64
4lcb spoofe...AC.bat
windows10-2004-x64
4lcb spoofe...up.exe
windows7-x64
3lcb spoofe...up.exe
windows10-2004-x64
3lcb spoofe...ck.exe
windows7-x64
1lcb spoofe...ck.exe
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1lcb spoofe...64.dll
windows7-x64
1lcb spoofe...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:28
Behavioral task
behavioral1
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lcb spoofer_updated_quack/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
lcb spoofer_updated_quack/Serial Checker.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lcb spoofer_updated_quack/cleaners/FortniteCleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
lcb spoofer_updated_quack/cleaners/Midnight.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
lcb spoofer_updated_quack/cleaners/Toruney_Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
lcb spoofer_updated_quack/cleaners/cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/New Cleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/applecleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/clean3.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EAC.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
lcb spoofer_updated_quack/cleaners/leakedshit/eac install/EasyAntiCheat_EOS_Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
lcb spoofer_updated_quack/lcb_spoof_crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
lcb spoofer_updated_quack/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
lcb spoofer_updated_quack/libssl-3-x64.dll
Resource
win10v2004-20241007-en
General
-
Target
lcb spoofer_updated_quack/cleaners/Midnight.bat
-
Size
104KB
-
MD5
98c35392bddb76264b1004a0dbf67236
-
SHA1
2a32cd70da5f7a7fd43952d066f705538e980191
-
SHA256
5a21145b429b84651b8b30506382c7643e631bc917de152d70cf6aa8fdfb15b8
-
SHA512
532b6a175755d340f8f5424dadbbd1ee0dac1680979e2365000024a63d226869c12384600597276217b73be7664fe6735da96fd6fb9dc1bd8fa6a5208c219202
-
SSDEEP
768:l/KZzmezl/svUsfg8gVhCBL1oPY8xC01n5xpoL8oPlRPOpL5LvLpLjLgzJu/:Fg8gU61nvplxL5LvLpLjLw6
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2644 sc.exe -
Kills process with taskkill 19 IoCs
pid Process 3564 taskkill.exe 3936 taskkill.exe 3208 taskkill.exe 5020 taskkill.exe 552 taskkill.exe 2932 taskkill.exe 4468 taskkill.exe 3404 taskkill.exe 3732 taskkill.exe 1496 taskkill.exe 4272 taskkill.exe 3816 taskkill.exe 5016 taskkill.exe 2800 taskkill.exe 4764 taskkill.exe 3680 taskkill.exe 536 taskkill.exe 3068 taskkill.exe 2756 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 3208 taskkill.exe Token: SeDebugPrivilege 4468 taskkill.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 2756 taskkill.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 4272 taskkill.exe Token: SeDebugPrivilege 552 taskkill.exe Token: SeDebugPrivilege 3816 taskkill.exe Token: SeDebugPrivilege 5016 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 2932 taskkill.exe Token: SeDebugPrivilege 3936 taskkill.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2800 4496 cmd.exe 86 PID 4496 wrote to memory of 2800 4496 cmd.exe 86 PID 4496 wrote to memory of 4764 4496 cmd.exe 88 PID 4496 wrote to memory of 4764 4496 cmd.exe 88 PID 4496 wrote to memory of 3068 4496 cmd.exe 89 PID 4496 wrote to memory of 3068 4496 cmd.exe 89 PID 4496 wrote to memory of 3208 4496 cmd.exe 90 PID 4496 wrote to memory of 3208 4496 cmd.exe 90 PID 4496 wrote to memory of 4468 4496 cmd.exe 91 PID 4496 wrote to memory of 4468 4496 cmd.exe 91 PID 4496 wrote to memory of 3732 4496 cmd.exe 92 PID 4496 wrote to memory of 3732 4496 cmd.exe 92 PID 4496 wrote to memory of 3404 4496 cmd.exe 93 PID 4496 wrote to memory of 3404 4496 cmd.exe 93 PID 4496 wrote to memory of 1496 4496 cmd.exe 94 PID 4496 wrote to memory of 1496 4496 cmd.exe 94 PID 4496 wrote to memory of 5020 4496 cmd.exe 95 PID 4496 wrote to memory of 5020 4496 cmd.exe 95 PID 4496 wrote to memory of 2756 4496 cmd.exe 96 PID 4496 wrote to memory of 2756 4496 cmd.exe 96 PID 4496 wrote to memory of 3680 4496 cmd.exe 97 PID 4496 wrote to memory of 3680 4496 cmd.exe 97 PID 4496 wrote to memory of 3564 4496 cmd.exe 98 PID 4496 wrote to memory of 3564 4496 cmd.exe 98 PID 4496 wrote to memory of 4272 4496 cmd.exe 99 PID 4496 wrote to memory of 4272 4496 cmd.exe 99 PID 4496 wrote to memory of 552 4496 cmd.exe 100 PID 4496 wrote to memory of 552 4496 cmd.exe 100 PID 4496 wrote to memory of 3816 4496 cmd.exe 101 PID 4496 wrote to memory of 3816 4496 cmd.exe 101 PID 4496 wrote to memory of 5016 4496 cmd.exe 102 PID 4496 wrote to memory of 5016 4496 cmd.exe 102 PID 4496 wrote to memory of 536 4496 cmd.exe 103 PID 4496 wrote to memory of 536 4496 cmd.exe 103 PID 4496 wrote to memory of 2932 4496 cmd.exe 104 PID 4496 wrote to memory of 2932 4496 cmd.exe 104 PID 4496 wrote to memory of 3936 4496 cmd.exe 105 PID 4496 wrote to memory of 3936 4496 cmd.exe 105 PID 4496 wrote to memory of 2644 4496 cmd.exe 106 PID 4496 wrote to memory of 2644 4496 cmd.exe 106
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lcb spoofer_updated_quack\cleaners\Midnight.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Agent.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Client.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:2644
-