Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 00:17

General

  • Target

    r2modman.exe

  • Size

    120.6MB

  • MD5

    f54d0c35c25f6de07efa1b6cebc95842

  • SHA1

    1db3f2a9842024119a0f46a816f3522512baf19d

  • SHA256

    a21d81dca44e3769087254a57e9118a5e9bb2a962f0006ba0e68bb41a8596c15

  • SHA512

    5c52e1dca87c3ab227e5a902cafa046a7c60d8e975d0a140e372ac7b0c8275c8867e66cadef99b9b455dbda4b0e7b6413d91bf687d2b2788a6e9a286809a9d29

  • SSDEEP

    1572864:A1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:lasulbg8yTnbEOz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
    "C:\Users\Admin\AppData\Local\Temp\r2modman.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
      "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1712 /prefetch:2
      2⤵
        PID:3940
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:8
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:3724
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=renderer --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --node-integration-in-worker --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:3324
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1704,5182552125153479099,11739332200593225145,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4812
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:1208
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3208
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1184

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\r2modman\IndexedDB\file__0.indexeddb.leveldb\CURRENT

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Roaming\r2modman\Network Persistent State

          Filesize

          188B

          MD5

          e58a9c0b92f3aa8f4110ac3f4a0f806d

          SHA1

          282cd30f443f2a0c8df5c3cd0f040ffc396c5d9d

          SHA256

          213227437414f02bdda41af727ffd96caa54e4488840639ab6a0629ca9bfc6fa

          SHA512

          35cdf67d47ead243b193cbed06b7a9a2e4c60d87e50de098069a52eb238267040f19db2d779f560dc253dee9cc18151377c7d96026e88173038ea66862221320

        • C:\Users\Admin\AppData\Roaming\r2modman\Network Persistent State~RFe587153.TMP

          Filesize

          59B

          MD5

          2800881c775077e1c4b6e06bf4676de4

          SHA1

          2873631068c8b3b9495638c865915be822442c8b

          SHA256

          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

          SHA512

          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

        • memory/1184-92-0x000001F3BEA40000-0x000001F3BEA50000-memory.dmp

          Filesize

          64KB

        • memory/1184-110-0x000001F3C6D90000-0x000001F3C6D91000-memory.dmp

          Filesize

          4KB

        • memory/1184-112-0x000001F3C6EA0000-0x000001F3C6EA1000-memory.dmp

          Filesize

          4KB

        • memory/1184-111-0x000001F3C6D90000-0x000001F3C6D91000-memory.dmp

          Filesize

          4KB

        • memory/1184-108-0x000001F3C6D60000-0x000001F3C6D61000-memory.dmp

          Filesize

          4KB

        • memory/1184-76-0x000001F3BE940000-0x000001F3BE950000-memory.dmp

          Filesize

          64KB

        • memory/3940-5-0x00007FFAD4130000-0x00007FFAD4131000-memory.dmp

          Filesize

          4KB