Analysis

  • max time kernel
    94s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 03:49

General

  • Target

    2024-11-07_b4c5da2d9e9767bc6d84a33eeb480a3e_frostygoop_luca-stealer_poet-rat_snatch.exe

  • Size

    7.1MB

  • MD5

    b4c5da2d9e9767bc6d84a33eeb480a3e

  • SHA1

    fc24548dcb1183a69df74a42f9606a5c08e03d7d

  • SHA256

    902366956f09f5021931f8793b1995fb9b89a0dcc1661e9eef635981fcd7d837

  • SHA512

    5ddcb4c3073c576818e94b843fa0ee43e8c27cbe42aaa0b4452fb5e5ab5aae1127fff5aa4bb0ace3159235f7fafab7d22a5a4fcb8eaec6e22e99b5323a4b6cac

  • SSDEEP

    98304:l5vITH2Tl6nlx9yE2jEdT95X+HqV/6asoCaRN1lMI6jQ:lcH2Tl6h26jONasoCafDSQ

Malware Config

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-07_b4c5da2d9e9767bc6d84a33eeb480a3e_frostygoop_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-07_b4c5da2d9e9767bc6d84a33eeb480a3e_frostygoop_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\AppData\Roaming\meshagent64-b.exe
      "C:\Users\Admin\AppData\Roaming\meshagent64-b.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:3836
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4164
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4340
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:4468
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:1804
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:1172
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:1580
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:2004
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:3656
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:1476
          • C:\Windows\system32\cmd.exe
            /c manage-bde -protectors -get C: -Type recoverypassword
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4048
            • C:\Windows\system32\manage-bde.exe
              manage-bde -protectors -get C: -Type recoverypassword
              3⤵
                PID:1200
            • C:\Windows\system32\cmd.exe
              /c manage-bde -protectors -get F: -Type recoverypassword
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2088
              • C:\Windows\system32\manage-bde.exe
                manage-bde -protectors -get F: -Type recoverypassword
                3⤵
                  PID:2316

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

              Filesize

              153KB

              MD5

              7e2f11eb7826370ab3d75f0f61132374

              SHA1

              9ab712168ec91f2114ce20d1a048a3290646fccd

              SHA256

              8f02bb261488df08d70ec692bf7b8df6b65e27a8ca9a3d0a8e751da724e053dd

              SHA512

              ad0e00800c9cb11ec512a3052792974810f79cfcf0a1af20be096dcb04ec613024b70e0b27f28002f12c8d39d3b7233ebf16d188943f1dd9b9385c97be7932a5

            • C:\Users\Admin\AppData\Roaming\meshagent64-b.exe

              Filesize

              3.3MB

              MD5

              ef6b6ec0834d1e1caff052af44848a9b

              SHA1

              9a40ee52fbe154b8dc897e11b28060158c918a69

              SHA256

              1db625d1b33d9aef595bbf6eb12c457b9ea98c908a6908c40096351ed0e4ad37

              SHA512

              7aede4ae460377d0c6bb3578435c41e45e7370dd419a6b824c90f2861cd60162b90f85015bc3e2aedd44ea3973a02dc9cd012567bd12d336adcd3ea120a12c72

            • C:\Windows\Temp\__PSScriptPolicyTest_2s5lfwmh.nc2.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              06d16fea6ab505097d16fcaa32949d47

              SHA1

              0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

              SHA256

              54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

              SHA512

              03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              ef9bf12b81b01411b78e32558b9a29fb

              SHA1

              291ca6560be0d3deb23116dbb092eb5285c12a7d

              SHA256

              b6c21f224abe907a915aa238df869c96d9a68b8a2358b49e1036ee2412a1259e

              SHA512

              2cf04565d45e505b9e3b882c64ccd8f38b7e132e224485992f104289d96581cd8f2496ff6aaadac1c13555668ef7592cbe307cf0c1d9dc2d2987d0545f264d63

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              70624ef632b3cfe592f322f1648e0d8c

              SHA1

              17f358e191625793d2ca652a5cdfb005f9f0c587

              SHA256

              dc17d23bc3a4d857d3f102f6be05710448419d58a44aadb1c7af8cc57c7a19db

              SHA512

              0372be743b1fcb470d0fb930edf885b926fc80f6251269fea950422d2ee95554834e81fc94654a497e467f0dfffb3aa56036123c3350d95ac4a4afb3464fe900

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              2c0bdf06d302688498d4e7f9cd669ab5

              SHA1

              18186323d93499e03f737f137b4ad795eb7f470b

              SHA256

              86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

              SHA512

              f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

            • memory/1476-133-0x000002C23FB30000-0x000002C23FB5A000-memory.dmp

              Filesize

              168KB

            • memory/1476-134-0x000002C23FB30000-0x000002C23FB54000-memory.dmp

              Filesize

              144KB

            • memory/1476-132-0x000002C23FA70000-0x000002C23FB25000-memory.dmp

              Filesize

              724KB

            • memory/1580-49-0x000002AAFA440000-0x000002AAFA4B6000-memory.dmp

              Filesize

              472KB

            • memory/1580-48-0x000002AAFA370000-0x000002AAFA3B4000-memory.dmp

              Filesize

              272KB

            • memory/1580-43-0x000002AAE1540000-0x000002AAE1562000-memory.dmp

              Filesize

              136KB

            • memory/2004-82-0x000001B550A50000-0x000001B550A5A000-memory.dmp

              Filesize

              40KB

            • memory/2004-86-0x000001B551820000-0x000001B551828000-memory.dmp

              Filesize

              32KB

            • memory/2004-87-0x000001B551830000-0x000001B551836000-memory.dmp

              Filesize

              24KB

            • memory/2004-88-0x000001B5519C0000-0x000001B5519CA000-memory.dmp

              Filesize

              40KB

            • memory/2004-85-0x000001B5519A0000-0x000001B5519BA000-memory.dmp

              Filesize

              104KB

            • memory/2004-84-0x000001B550A60000-0x000001B550A6A000-memory.dmp

              Filesize

              40KB

            • memory/2004-83-0x000001B551980000-0x000001B55199C000-memory.dmp

              Filesize

              112KB

            • memory/2004-80-0x000001B551800000-0x000001B55181C000-memory.dmp

              Filesize

              112KB

            • memory/2004-81-0x000001B5518C0000-0x000001B551975000-memory.dmp

              Filesize

              724KB