Overview
overview
7Static
static
3r2modman-3...pimage
ubuntu-20.04-amd64
3r2modman-S...47.exe
windows7-x64
7r2modman-S...47.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1r2modman.exe
windows7-x64
1r2modman.exe
windows10-2004-x64
7resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1snapshot_blob.ps1
windows7-x64
1snapshot_blob.ps1
windows10-2004-x64
1swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
r2modman-3.1.47.appimage
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral2
Sample
r2modman-Setup-3.1.47.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
r2modman-Setup-3.1.47.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231129-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
r2modman.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
r2modman.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
resources/elevate.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
snapshot_blob.ps1
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
snapshot_blob.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
swiftshader/libEGL.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
swiftshader/libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
vk_swiftshader.dll
Resource
win10v2004-20231215-en
General
-
Target
r2modman.exe
-
Size
120.6MB
-
MD5
f54d0c35c25f6de07efa1b6cebc95842
-
SHA1
1db3f2a9842024119a0f46a816f3522512baf19d
-
SHA256
a21d81dca44e3769087254a57e9118a5e9bb2a962f0006ba0e68bb41a8596c15
-
SHA512
5c52e1dca87c3ab227e5a902cafa046a7c60d8e975d0a140e372ac7b0c8275c8867e66cadef99b9b455dbda4b0e7b6413d91bf687d2b2788a6e9a286809a9d29
-
SSDEEP
1572864:A1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:lasulbg8yTnbEOz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation r2modman.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation r2modman.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\shell r2modman.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\shell\open r2modman.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\r2modman.exe\" \"%1\"" r2modman.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm r2modman.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\URL Protocol r2modman.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\ = "URL:ror2mm" r2modman.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ror2mm\shell\open\command r2modman.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 r2modman.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 r2modman.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 r2modman.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3724 r2modman.exe 3724 r2modman.exe 3324 r2modman.exe 3324 r2modman.exe 3324 r2modman.exe 3324 r2modman.exe 3324 r2modman.exe 3324 r2modman.exe 4812 r2modman.exe 4812 r2modman.exe 4812 r2modman.exe 4812 r2modman.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1184 svchost.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3940 3504 r2modman.exe 91 PID 3504 wrote to memory of 3724 3504 r2modman.exe 92 PID 3504 wrote to memory of 3724 3504 r2modman.exe 92 PID 3504 wrote to memory of 3324 3504 r2modman.exe 93 PID 3504 wrote to memory of 3324 3504 r2modman.exe 93 PID 3504 wrote to memory of 4812 3504 r2modman.exe 117 PID 3504 wrote to memory of 4812 3504 r2modman.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=renderer --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --node-integration-in-worker --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5e58a9c0b92f3aa8f4110ac3f4a0f806d
SHA1282cd30f443f2a0c8df5c3cd0f040ffc396c5d9d
SHA256213227437414f02bdda41af727ffd96caa54e4488840639ab6a0629ca9bfc6fa
SHA51235cdf67d47ead243b193cbed06b7a9a2e4c60d87e50de098069a52eb238267040f19db2d779f560dc253dee9cc18151377c7d96026e88173038ea66862221320
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b