This won't work at all.
These days there are many ways code can fingerprint the hardware of a device. This is much easier in a mobile device. The fingerprinting is not always obvious like canvas fingerprinting and may be proprietary (ie, the App queries an API that launches a memory/graphics test and developes a hash and then stores it on a server off the device linked to you). In Graphene there is a consistent media device ID that survives resetting the device and exists across all profiles. Profiles help to compartmentalize. They only provide some anonymity if youve ever done anything KYC with the hardware linked to an ID. You can try it but they will likely know it's you. They used to not do this and got tons of bots scammers and ad fraud and so they implemented lots of stuff to try to identify hardware. They do not tell people what it is. You can try and a new profile could be enough. There are posts on here about creeps.js ans other fingerprinting that show the problem.
Graphene OS is a harder OS for someone to hack or break into BFU and it does not have spyware backed into the OS. But Apps know it's Graphene if they are big corporations, they notice the absence of spyware.
A lot of times when people like Daniel are asked about reducing the fingerprint attack surface of Graphene, they say it's pointless because there are some things you can't block. In other words, to prevent the code from fingerprinting, you would have to spoof hardware. There have been talks among the developers about virtualizing inside Graphene, but it would be so mich work and if that happens, it will be far in the future.
At the same time, Graphene is fighting the Play Integrity API monopoly and so they may not want to totally prevent fingerprinting attacks because Graphene OS is really supposed to be a secure distro, not a distro for doing sketchy things.
But your understanding of things is wrong. It's not clear why you are mentioning Qubes. Qubes is configured for extreme compartmentalization and virtualization but does not inherently prevent fingerprinting within a virtualized environment.