Analysis

  • max time kernel
    435s
  • max time network
    442s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-01-2025 21:04

General

  • Target

    ValorantExternalCheat-main/auth.hpp

  • Size

    1KB

  • MD5

    68ca7e05166eb5e3d6de4fc6e52749ba

  • SHA1

    343e9a636141ee4cf970765bd707fd56a7f2bd02

  • SHA256

    3414a4cb52b4efadfb3c86d451542adbfddd02f6b988c0855052ec287b308222

  • SHA512

    1608ea43f38ec60d3a059279994c3db91be1e3de183bd5aa0464fb22f2f231a604b905e419ac730553f8f20b9206e7e096b12dda7794f7cd2fedb6b20a112bb1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ValorantExternalCheat-main\auth.hpp
    1⤵
    • Modifies registry class
    PID:3044
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1588
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:4088
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
    1⤵
    • Enumerates system info in registry
    PID:1884
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\SNF4KQJV\www.bing[1].xml

    Filesize

    7KB

    MD5

    46446bfa479671a4971d4c886d2a978b

    SHA1

    0167d72eb6cdb66e8adedcbd9dd51803309ce49b

    SHA256

    390076299073a8e9897f5717a73e05466766e64ef01bf578db3a3862966554a1

    SHA512

    658f4dfca9760d8ff52ac75a6f7400cedecc8835cb97590d7512b996f14b602abddd981e55ff02e53029d8ef28dc4dbe853bff137d7030c2c637a79157f2f56e

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\SNF4KQJV\www.bing[1].xml

    Filesize

    17KB

    MD5

    0dc828381bc68d2763480efb9f7b088f

    SHA1

    8e060c03555393ff0aaad8453ab1ef0de37d58bb

    SHA256

    aebdab50e49ff5a4df0dc12afe7d3ef3356a214560e21bb3401fac2aad6357e4

    SHA512

    f0f100d195d348ca59ad757ab8149f23d7204254b33b7c1e7151ef919e4fad4dab7620535b63ec3cf55c2c53a2f8bb973aca94c8e3dc457cfc03b7782184ae0b

  • memory/4940-9-0x000001D88C360000-0x000001D88C460000-memory.dmp

    Filesize

    1024KB

  • memory/4940-90-0x000001D8C0020000-0x000001D8C0120000-memory.dmp

    Filesize

    1024KB

  • memory/4940-134-0x000001D8C0340000-0x000001D8C0440000-memory.dmp

    Filesize

    1024KB

  • memory/4940-133-0x000001D8BEB50000-0x000001D8BEB70000-memory.dmp

    Filesize

    128KB

  • memory/4940-135-0x000001D8C0180000-0x000001D8C01A0000-memory.dmp

    Filesize

    128KB

  • memory/4940-209-0x000001D8C14A0000-0x000001D8C14C0000-memory.dmp

    Filesize

    128KB

  • memory/4940-225-0x000001D8C3F80000-0x000001D8C4080000-memory.dmp

    Filesize

    1024KB