Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 14:14

General

  • Target

    r2modman.exe

  • Size

    120.6MB

  • MD5

    450f62399b2decd69b51831469134546

  • SHA1

    a2392cc7dcdd12ad851ce9f5ba72982d93563f46

  • SHA256

    9c01490d325451e14945f50af46397177820f579d67c6412e2ef1335414d3639

  • SHA512

    8c0a1c9f63422ab80a665ca482604182e5e4c1389e264e324c4b4aab4f8fcbad6eb7aa0827c6c5c9648c670d625bbc43d9aa0d708ea469afa09349b735ba92b2

  • SSDEEP

    1572864:A1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:lasulbg8yTnbEOz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
    "C:\Users\Admin\AppData\Local\Temp\r2modman.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
      "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1624 /prefetch:2
      2⤵
        PID:2732
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2068 /prefetch:8
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1788
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=renderer --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --node-integration-in-worker --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:2904
      • C:\Users\Admin\AppData\Local\Temp\r2modman.exe
        "C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1948 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:872
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:3964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\r2modman\IndexedDB\file__0.indexeddb.leveldb\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\r2modman\Network Persistent State

        Filesize

        188B

        MD5

        e58a9c0b92f3aa8f4110ac3f4a0f806d

        SHA1

        282cd30f443f2a0c8df5c3cd0f040ffc396c5d9d

        SHA256

        213227437414f02bdda41af727ffd96caa54e4488840639ab6a0629ca9bfc6fa

        SHA512

        35cdf67d47ead243b193cbed06b7a9a2e4c60d87e50de098069a52eb238267040f19db2d779f560dc253dee9cc18151377c7d96026e88173038ea66862221320

      • C:\Users\Admin\AppData\Roaming\r2modman\Network Persistent State~RFe58652d.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • memory/2732-18-0x00007FFA80780000-0x00007FFA80781000-memory.dmp

        Filesize

        4KB

      • memory/2732-59-0x00000235C4CF0000-0x00000235C4DBD000-memory.dmp

        Filesize

        820KB