Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3r2modman-3...pimage
ubuntu-20.04-amd64
4r2modman-S...48.exe
windows7-x64
7r2modman-S...48.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1r2modman.exe
windows7-x64
1r2modman.exe
windows10-2004-x64
7resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
r2modman-3.1.48.appimage
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral2
Sample
r2modman-Setup-3.1.48.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
r2modman-Setup-3.1.48.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
r2modman.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
r2modman.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
resources/elevate.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
swiftshader/libEGL.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
swiftshader/libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
vk_swiftshader.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
vulkan-1.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win10v2004-20240412-en
General
-
Target
r2modman.exe
-
Size
120.6MB
-
MD5
450f62399b2decd69b51831469134546
-
SHA1
a2392cc7dcdd12ad851ce9f5ba72982d93563f46
-
SHA256
9c01490d325451e14945f50af46397177820f579d67c6412e2ef1335414d3639
-
SHA512
8c0a1c9f63422ab80a665ca482604182e5e4c1389e264e324c4b4aab4f8fcbad6eb7aa0827c6c5c9648c670d625bbc43d9aa0d708ea469afa09349b735ba92b2
-
SSDEEP
1572864:A1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:lasulbg8yTnbEOz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation r2modman.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation r2modman.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\ = "URL:ror2mm" r2modman.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\shell\open\command r2modman.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\shell r2modman.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\shell\open r2modman.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\r2modman.exe\" \"%1\"" r2modman.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm r2modman.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\ror2mm\URL Protocol r2modman.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 r2modman.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 r2modman.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 r2modman.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1788 r2modman.exe 1788 r2modman.exe 2904 r2modman.exe 2904 r2modman.exe 2904 r2modman.exe 2904 r2modman.exe 2904 r2modman.exe 2904 r2modman.exe 872 r2modman.exe 872 r2modman.exe 872 r2modman.exe 872 r2modman.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 2732 636 r2modman.exe 88 PID 636 wrote to memory of 1788 636 r2modman.exe 89 PID 636 wrote to memory of 1788 636 r2modman.exe 89 PID 636 wrote to memory of 2904 636 r2modman.exe 90 PID 636 wrote to memory of 2904 636 r2modman.exe 90 PID 636 wrote to memory of 872 636 r2modman.exe 111 PID 636 wrote to memory of 872 636 r2modman.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1624 /prefetch:22⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2068 /prefetch:82⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=renderer --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --node-integration-in-worker --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\r2modman.exe"C:\Users\Admin\AppData\Local\Temp\r2modman.exe" --type=gpu-process --field-trial-handle=1676,13251243998966594901,16571656379997651412,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5e58a9c0b92f3aa8f4110ac3f4a0f806d
SHA1282cd30f443f2a0c8df5c3cd0f040ffc396c5d9d
SHA256213227437414f02bdda41af727ffd96caa54e4488840639ab6a0629ca9bfc6fa
SHA51235cdf67d47ead243b193cbed06b7a9a2e4c60d87e50de098069a52eb238267040f19db2d779f560dc253dee9cc18151377c7d96026e88173038ea66862221320
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b