Overview
overview
10Static
static
10ValorantEx...in.zip
windows10-ltsc 2021-x64
10ValorantEx...ot.hpp
windows10-ltsc 2021-x64
3ValorantEx...es.hpp
windows10-ltsc 2021-x64
3ValorantEx...re.cpp
windows10-ltsc 2021-x64
3ValorantEx...re.hpp
windows10-ltsc 2021-x64
3ValorantEx...pi.hpp
windows10-ltsc 2021-x64
3ValorantEx...ICENSE
windows10-ltsc 2021-x64
1ValorantEx...er.exe
windows10-ltsc 2021-x64
10ValorantEx...DME.md
windows10-ltsc 2021-x64
3ValorantEx...th.hpp
windows10-ltsc 2021-x64
3ValorantEx...ok.cpp
windows10-ltsc 2021-x64
3ValorantEx...ok.hpp
windows10-ltsc 2021-x64
3ValorantEx...in.cpp
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-01-2025 19:21
Behavioral task
behavioral1
Sample
ValorantExternalCheat-main.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
ValorantExternalCheat-main/Aimbot.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
ValorantExternalCheat-main/Classes.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
ValorantExternalCheat-main/Core.cpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
ValorantExternalCheat-main/Core.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
ValorantExternalCheat-main/CustomWinApi.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
ValorantExternalCheat-main/LICENSE
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
ValorantExternalCheat-main/Loader.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
ValorantExternalCheat-main/README.md
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral10
Sample
ValorantExternalCheat-main/auth.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral11
Sample
ValorantExternalCheat-main/d3d_Hook.cpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral12
Sample
ValorantExternalCheat-main/d3d_Hook.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral13
Sample
ValorantExternalCheat-main/dllmain.cpp
Resource
win10ltsc2021-20250113-en
General
-
Target
ValorantExternalCheat-main.zip
-
Size
276KB
-
MD5
e19418334073fe555b50081d008b6456
-
SHA1
01c7b1f7c567dbf1f568084e67a0f45deb23458b
-
SHA256
25cb832f9eb2346c8a4ec411b6ecc3eb9e9142ef46fbaccf8acb3a9067993637
-
SHA512
38cd4ecaa43fce9122d8bca2dd8e52ced4504a76616b775af174a58695deb115faae01c8e445f9705ed055e64d668174bbc46bb5547ef557134c3419920b9b7f
-
SSDEEP
6144:VfBvW03SUNn/H1VEmtpjDqErPdAaihE2/pI8qj7ZaLP5TkPiH:Vpp3J1OODqIPdAdq2/q97ALRTBH
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://undesirabkel.click/api
Extracted
lumma
https://undesirabkel.click/api
Signatures
-
Lumma family
-
Executes dropped EXE 6 IoCs
pid Process 1212 Loader.exe 3448 Loader.exe 4044 Loader.exe 3900 Loader.exe 1924 Loader.exe 2636 Loader.exe -
Loads dropped DLL 6 IoCs
pid Process 1212 Loader.exe 3448 Loader.exe 4044 Loader.exe 3900 Loader.exe 1924 Loader.exe 2636 Loader.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1212 set thread context of 2572 1212 Loader.exe 94 PID 3448 set thread context of 1992 3448 Loader.exe 98 PID 4044 set thread context of 1460 4044 Loader.exe 101 PID 3900 set thread context of 2708 3900 Loader.exe 104 PID 1924 set thread context of 4772 1924 Loader.exe 107 PID 2636 set thread context of 760 2636 Loader.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3748 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3748 7zFM.exe Token: 35 3748 7zFM.exe Token: SeSecurityPrivilege 3748 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3748 7zFM.exe 3748 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 1212 wrote to memory of 2572 1212 Loader.exe 94 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 3448 wrote to memory of 1992 3448 Loader.exe 98 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 4044 wrote to memory of 1460 4044 Loader.exe 101 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 3900 wrote to memory of 2708 3900 Loader.exe 104 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107 PID 1924 wrote to memory of 4772 1924 Loader.exe 107
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ValorantExternalCheat-main.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3748
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Users\Admin\Desktop\Loader.exe"C:\Users\Admin\Desktop\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
428KB
MD536c0b5018242a87d99e2b5000dfc29ad
SHA1d46f1ba661e3d18c8b1e7895920368e9bddbc7ae
SHA25694cc3d303105493943c6cce20473c82eff3942515bfd73df976e802d97be78b4
SHA5128f10af3f519e2c52539fb79ec16cd82470f25c0863b622030ed4bd59f437c9109caf46d151c18889c4939a44672339d75029c8f757cf7118e759b90355317f0a
-
Filesize
489KB
MD5d685ae29670dbc00b6665b5511bda6cb
SHA12f49b83a6d7a5f9e5151c6f7f1b3fa9e6f4b25a9
SHA2560518c095cc948ab003cd4d12a1f95f0579c52c17f9102976b5799cd0bd85e6a2
SHA512d7705fcd8751a49cc17962ac9b6e228f55ef74aab066cabdd5de74518686feaea951487a042683ea3e055ce04e0b971b528572aac920f325fcf64d34167450de