Analysis

  • max time kernel
    1699s
  • max time network
    1177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 14:44

General

  • Target

    EraRev_Launcher/Client/RobloxLauncher.dll

  • Size

    76KB

  • MD5

    f4c780a3895c8a2dd36668dd59f9a516

  • SHA1

    7d8727849aecddd9e5c69d52e6e3ffca988327b2

  • SHA256

    16f31fe344e21d0d117fa041cc8b8770eba4658a4bd6679a26afbda5aa64248a

  • SHA512

    6de4476db6d6e14b1ef40ebc1c94ebd8db926c5f9ed20fcf2b85b8057f90b163b94b9d93d0bff81fd37744c6aaf5429c5e764c630dbcb540b29b6c9217388f35

  • SSDEEP

    1536:mT6g/Em2s6lIexZFfMHeCNIZDb5x8lGQlErvlO1SDUTCiHl:l4Em29IgFf6NIZpGl/Er9O1SDli

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\EraRev_Launcher\Client\RobloxLauncher.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\EraRev_Launcher\Client\RobloxLauncher.dll
      2⤵
      • Modifies registry class
      PID:3860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads