Windows Analysis Report
ValorantHack.exe

Overview

General Information

Sample name: ValorantHack.exe
Analysis ID: 1561388
MD5: a79b1017bbfe997cd39c782370117a0c
SHA1: 7aa5fc13cf2f811e645912646ace587059d6b024
SHA256: 22de86536c93e4742e4a3bcaaa80c6ec1e3b139c3cab85c35949b3c53d085392
Tags: exeuser-4k95m
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

AV Detection

barindex
Source: ValorantHack.exe Virustotal: Detection: 25% Perma Link
Source: ValorantHack.exe Joe Sandbox ML: detected
Source: ValorantHack.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ValorantHack.exe, 00000000.00000002.1732725976.0000000002B2E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs ValorantHack.exe
Source: ValorantHack.exe, 00000000.00000000.1686459366.0000000002463000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameDataSync.exe2 vs ValorantHack.exe
Source: ValorantHack.exe Binary or memory string: OriginalFilenameDataSync.exe2 vs ValorantHack.exe
Source: classification engine Classification label: mal52.winEXE@3/1@0/0
Source: C:\Users\user\Desktop\ValorantHack.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ValorantHack.exe.log Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Mutant created: NULL
Source: ValorantHack.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ValorantHack.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\ValorantHack.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled
Source: ValorantHack.exe Virustotal: Detection: 25%
Source: unknown Process created: C:\Users\user\Desktop\ValorantHack.exe "C:\Users\user\Desktop\ValorantHack.exe"
Source: C:\Users\user\Desktop\ValorantHack.exe Process created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled
Source: C:\Users\user\Desktop\ValorantHack.exe Process created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: ValorantHack.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: ValorantHack.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: ValorantHack.exe Static file information: File size 31469568 > 1048576
Source: ValorantHack.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x1e01600
Source: ValorantHack.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ValorantHack.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ValorantHack.exe Static PE information: 0xFEB07701 [Thu May 28 18:14:25 2105 UTC]
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Memory allocated: 4580000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Memory allocated: 4770000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Memory allocated: 6770000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe TID: 6804 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Process created: C:\Windows\SysWOW64\rundll32.exe "rundll32.exe" SystemCoreHelper.dll,GetCompiled Jump to behavior
Source: C:\Users\user\Desktop\ValorantHack.exe Queries volume information: C:\Users\user\Desktop\ValorantHack.exe VolumeInformation Jump to behavior
No contacted IP infos