Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/08/2024, 21:07

General

  • Target

    Era.exe

  • Size

    154.5MB

  • MD5

    1ea4db2ce0cfa5e8bec66927e7bbaaf0

  • SHA1

    6d08a80213a405de125a3e50e1bef3b5237c4686

  • SHA256

    ca81a8b9c3ba18a97adc203f8543528e42964f7ea42a49093a8c62616360c901

  • SHA512

    e6e47775fd7f8614d446d230c3cdee3763d93537d08fbc6f743e29a60791bfc536b367d4823066a00d1765a7c96a17e30097cb51a3f74a81afad98b5cb0a2c6b

  • SSDEEP

    1572864:GCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:cDAgZi

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Era.exe
    "C:\Users\Admin\AppData\Local\Temp\Era.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\binaries\FortniteLauncher.exe
      C:\Users\Admin\AppData\Local\Temp\binaries\FortniteLauncher.exe
      2⤵
        PID:3788
      • C:\Users\Admin\AppData\Local\Temp\Era.exe
        "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1708,i,9855969183007008649,17624057039859798509,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:3960
        • C:\Users\Admin\AppData\Local\Temp\Era.exe
          "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --mojo-platform-channel-handle=1880 --field-trial-handle=1708,i,9855969183007008649,17624057039859798509,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:3284
          • C:\Users\Admin\AppData\Local\Temp\Era.exe
            "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --app-user-model-id="Project Era" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2340 --field-trial-handle=1708,i,9855969183007008649,17624057039859798509,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
              PID:840
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "reg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed""
              2⤵
                PID:768
                • C:\Windows\system32\reg.exe
                  reg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed"
                  3⤵
                    PID:1432
                • C:\Users\Admin\AppData\Local\Temp\Era.exe
                  "C:\Users\Admin\AppData\Local\Temp\Era.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 --field-trial-handle=1708,i,9855969183007008649,17624057039859798509,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3372

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\c34aa684-caf2-4b7a-90e8-ef79f132daf9.tmp.node

                Filesize

                4.6MB

                MD5

                02362efe76c5bb57c31a2420df3e0933

                SHA1

                f3f2eee27c69183e42bc3c622eec11e6fe20a2e4

                SHA256

                ac7aa0a2562c9913434769f8d0828543f4665f7b9fc9119addcefb0f21c0e5fb

                SHA512

                7ea962d3345e5208f52152bc5798e1c7d1123a489bfede58ed04923d7f9b055342c771f92659c4fef70b9392bb605df0ec8032d3cb7db617ed6ffbb633b1fc76

              • C:\Users\Admin\AppData\Local\Temp\c4d2bbde-a39e-4354-a0cc-2784cfd8622b.tmp.node

                Filesize

                248KB

                MD5

                22309388d08fe973b02e072573f68a00

                SHA1

                d0f245d4c1d75035c1fab0332493a26dc14b2298

                SHA256

                e6cf751ef1d79ce050ba6b744452bb85d50639cde6a1bfed8860408458623042

                SHA512

                725bbba95dd5c71e8a83fe1e0bd85215f0a339e804fbad3faa6f4edaac0af7cbfc4b095e389750b8829ba1a74b14366ce4352e5ad4bc4802b0c3c50085dedee5

              • C:\Users\Admin\AppData\Roaming\Era\Network\Network Persistent State~RFe58d721.TMP

                Filesize

                59B

                MD5

                2800881c775077e1c4b6e06bf4676de4

                SHA1

                2873631068c8b3b9495638c865915be822442c8b

                SHA256

                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                SHA512

                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • memory/840-58-0x00007FF81B030000-0x00007FF81B031000-memory.dmp

                Filesize

                4KB

              • memory/840-57-0x00007FF81BDA0000-0x00007FF81BDA1000-memory.dmp

                Filesize

                4KB

              • memory/3372-98-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-97-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-99-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-109-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-108-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-107-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-106-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-105-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-104-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3372-103-0x0000022D0CC70000-0x0000022D0CC71000-memory.dmp

                Filesize

                4KB

              • memory/3788-69-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB