Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/02/2024, 08:36

General

  • Target

    Era.exe

  • Size

    150.3MB

  • MD5

    67bf9a932df8304336f6e09ee7bdc976

  • SHA1

    dcf56279a51006ac457c36fd4f21a163197e6fde

  • SHA256

    faa8c077c6670d2e190fdf5fe3109ebda48c776d0acbd931ab6e2950525a8c43

  • SHA512

    839510ab65f8f90ba62b973173bdf1626d2e9a9582c6d1de73d310672bc3db1d95f024902b5e0369ae3e06f6c1d1f3357f6a7b9906fe19eedd5729d87353abad

  • SSDEEP

    1572864:3oooF3VfXbsePcAR+emDcoIABdUCJZwbsuDu9p+gJqf/H+q0CwpMd1zowkfbODaT:QVwwoMCYoPVma

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Era.exe
    "C:\Users\Admin\AppData\Local\Temp\Era.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\binaries\FortniteLauncher.exe
      C:\Users\Admin\AppData\Local\Temp\binaries\FortniteLauncher.exe
      2⤵
        PID:2488
      • C:\Users\Admin\AppData\Local\Temp\Era.exe
        "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1728,i,3474468766660781008,7296920109073893338,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:2856
        • C:\Users\Admin\AppData\Local\Temp\Era.exe
          "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --mojo-platform-channel-handle=1836 --field-trial-handle=1728,i,3474468766660781008,7296920109073893338,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:4568
          • C:\Users\Admin\AppData\Local\Temp\Era.exe
            "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --app-user-model-id="Project Era" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2352 --field-trial-handle=1728,i,3474468766660781008,7296920109073893338,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
              PID:4808
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "reg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed""
              2⤵
                PID:3876
                • C:\Windows\system32\reg.exe
                  reg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed"
                  3⤵
                    PID:984
                • C:\Users\Admin\AppData\Local\Temp\Era.exe
                  "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4152 --field-trial-handle=1728,i,3474468766660781008,7296920109073893338,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4368

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\6c294ed9-0bf5-47b1-bb0f-99898aa1b9f9.tmp.node

                Filesize

                2.1MB

                MD5

                93c18445ea59474f96fc8b7c4b9004f6

                SHA1

                1fb6f10080ab3efe0371b6c1d716d05c64380ac2

                SHA256

                47be01d4abe6ad07748aeb9909b5c44749dab6912b3fcbd31b643f5eadd8155d

                SHA512

                a51d98eebe57422ecf35ab5a3f394169de03162710aa9e28d25b4b49c7c83b56c10de0653e5268c6b23fbbdbadb5e4e883d76e6f3e77988f0b425076a3dead38

              • C:\Users\Admin\AppData\Local\Temp\ca789d7f-10ad-4b68-ab70-f598206c4808.tmp.node

                Filesize

                261KB

                MD5

                0e722fcb4bfd093b7ac4be9a64ddc814

                SHA1

                71483f150d2524b1432f1c2213651194e5976122

                SHA256

                30cc2da146f0d67386bc8a8a6074055bcdb31b8370784a2b559f847d44cbfca5

                SHA512

                047b8ef568bfe6c1e6557e7f208be0fe81dff9cdf792d77fbb375bce24c9c15a1167414f79e09a92ef24811a277a516f092bd4d2939e505474725753da638b87

              • C:\Users\Admin\AppData\Roaming\Era\Network\Network Persistent State

                Filesize

                874B

                MD5

                5e0554e6b8835826d7e9d57a5a7e5240

                SHA1

                3b48ce3d92aab97f23e03f236422eb71ddd1f867

                SHA256

                039ee863dda88aeaaca1c89c63c14873ebd40e31f60656134655841ec7661de3

                SHA512

                8d11e7325a57ba2beeb44e182f8eab1709187437a170240d1a01383910b77c26561f4ae3f5624287da4c0758d2147ce4114729330c66b8ab8a61e55468e9e358

              • C:\Users\Admin\AppData\Roaming\Era\Network\Network Persistent State~RFe5899e9.TMP

                Filesize

                59B

                MD5

                2800881c775077e1c4b6e06bf4676de4

                SHA1

                2873631068c8b3b9495638c865915be822442c8b

                SHA256

                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                SHA512

                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

              • C:\Users\Admin\AppData\Roaming\Era\Network\TransportSecurity

                Filesize

                371B

                MD5

                65aa7fd0f43dc1c4ec4c310c175180f3

                SHA1

                31bdf2b2d508eea9fceb7751bae910fe439cfa7c

                SHA256

                77666263eee3c3f4b9008c91b0ba569a55864484cc2a313f91efb3d8be533649

                SHA512

                2de244fa8f0c434c07156f1a824510bc974a6ee22d1cb4debcd9701743c0c6aac1a61efd6ecce1c9b085b08f1cb004be968344336f69ea88198d8254ca4d9c3a

              • C:\Users\Admin\AppData\Roaming\Era\Network\TransportSecurity~RFe57ef71.TMP

                Filesize

                371B

                MD5

                771a92ad6af7521ec6d7cac5b6cdeef7

                SHA1

                7c1dde26583269060776ee73e01d05743aff8637

                SHA256

                ac8ece15eb6b7fda95cc20e66d8ac68815fef697f29dfdf87aaac9c994b0749c

                SHA512

                a00c443a9868d35dd6c54e36a6496bececf717e6365ee450412753560ff49b38af02bb2fa528922ac64e3b5040c8ff0e624f3536d2ddf6b7402db21d8535883c

              • C:\Users\Admin\AppData\Roaming\Era\Session Storage\CURRENT

                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • memory/2488-79-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2856-15-0x00007FFD6E9C0000-0x00007FFD6E9C1000-memory.dmp

                Filesize

                4KB

              • memory/2856-80-0x0000021912F00000-0x0000021912F6F000-memory.dmp

                Filesize

                444KB

              • memory/4368-140-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-132-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-133-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-134-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-138-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-139-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-142-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-144-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-145-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4368-147-0x000002C9CCEB0000-0x000002C9CCEB1000-memory.dmp

                Filesize

                4KB

              • memory/4808-59-0x00007FFD6FC30000-0x00007FFD6FC31000-memory.dmp

                Filesize

                4KB

              • memory/4808-81-0x000001CC14530000-0x000001CC1459F000-memory.dmp

                Filesize

                444KB

              • memory/4808-60-0x00007FFD6F0B0000-0x00007FFD6F0B1000-memory.dmp

                Filesize

                4KB