Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 20:03

General

  • Target

    2024-11-07_1db373b17f59735e466cf096f4a3b2a1_frostygoop_luca-stealer_poet-rat_snatch.exe

  • Size

    7.1MB

  • MD5

    1db373b17f59735e466cf096f4a3b2a1

  • SHA1

    4dda405e028d69406cb6b870ed5a7d9e45a9a122

  • SHA256

    0c30201fa247ef384098a2360270280d73fb1cea17f4e0f9d1b829dcab620b85

  • SHA512

    ae391e3c8965a24dce1b1802907f59729a3ed7b93a7fdbda9f9fe00a5a6a6a43227556f87c8957a8ba2a0a8f4c26bf66a8dcfe7ad0193602ed529279d1c5a6aa

  • SSDEEP

    98304:pA47lMQl5tHuC+Eo5EdT9k/6asoCaRN1lMI6jQ:pLMQl5kkokTasoCafDSQ

Malware Config

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-07_1db373b17f59735e466cf096f4a3b2a1_frostygoop_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-07_1db373b17f59735e466cf096f4a3b2a1_frostygoop_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]
      "C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]" -fullinstall
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4668
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1476
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1724
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1656
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:5092
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:4888
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:2932
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:3980
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:956
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4664
          • C:\Windows\system32\cmd.exe
            /c manage-bde -protectors -get C: -Type recoverypassword
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2216
            • C:\Windows\system32\manage-bde.exe
              manage-bde -protectors -get C: -Type recoverypassword
              3⤵
                PID:4668
            • C:\Windows\system32\cmd.exe
              /c manage-bde -protectors -get F: -Type recoverypassword
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2292
              • C:\Windows\system32\manage-bde.exe
                manage-bde -protectors -get F: -Type recoverypassword
                3⤵
                  PID:2656

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

              Filesize

              153KB

              MD5

              9363ede385b875808400ad7ceb66571c

              SHA1

              19eefe95b96f85465ceb4b68a92ba79ffb9d3c1c

              SHA256

              b451487eb48b5b1c88fee8118de4e6cfac70ded285fa607a67208321d489dd4d

              SHA512

              7bc601389ee3cdb012163d9d804b562ab55665a134a9dbfa41a42a6aed6bf8516feecde5993c8ce7d5eff117e3449236624a625bc70ad9905a06a71882a0cd16

            • C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]

              Filesize

              3.3MB

              MD5

              9c3de7192e8ed1f42790bee4b5356786

              SHA1

              5272b834e29e03c3c807aa2b6140c8180d1dc288

              SHA256

              6dfd22ca602fee5740548b2d61a54e224b790acfa3b412259790145566b52671

              SHA512

              41b59e32c8bc7240cf7ae415602a9e4d1d4e4b516bb35f3d09de1d2a87fa2a1f405cf30a4f797879188ea06026716426d383c65d237b68dd43ed96bc04093b8f

            • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5F7D86F16B376678AB2206AA5FFF43BA895F3665

              Filesize

              1KB

              MD5

              8c30c70e5fdf8650a5f17999799cef9e

              SHA1

              5a338048d96ff0adaad35e1b70434d12cccb6f86

              SHA256

              55e53886fa7ea0f9d579a22639676fd4e400a7b41d8e36a0b968716d94fee6ea

              SHA512

              b351688eebe6d4484fe9b168945ac5bf2960e10e7261aaf398f16c1f385aa1c251e0536d8ca6800fda1381ec1ee1a929f15637819456a0d03d683e02615a8b68

            • C:\Windows\Temp\__PSScriptPolicyTest_jj3ndi52.5tr.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              06d16fea6ab505097d16fcaa32949d47

              SHA1

              0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

              SHA256

              54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

              SHA512

              03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              77ebd6a7d20b8204b95cb4dc65011c5d

              SHA1

              bfdb833ee8db1b9778f45a5b90fddd80da43e4c5

              SHA256

              b3b9f69c23369d99c17c1647b5e2821f55200173a8c2789e626792d6e42fabab

              SHA512

              b7e45e560a29be125e6accedcf603e2b5055da4eafb8f353d03f3f35e92fca0ed0223e3d51e2b93656cfa91c225dedf24307919c1cf44264529ffc1c574f7c58

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              718112bf0dbfa212280211f029dcb3fb

              SHA1

              c5739c7cc39d47852597576547f84bb5afc0cd9f

              SHA256

              a8dd32a217ceb22928ef1b97530f73657472578140e8d73169b04697037f554d

              SHA512

              7249a2b9f6c4dd8ab2edd378a91fc0212bdf85def98ba2d6b385cbab7d73f6422d90b89334964ec205c92789c4386f68cecd682abd1bb34b8c62fc7ee39da669

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              2c0bdf06d302688498d4e7f9cd669ab5

              SHA1

              18186323d93499e03f737f137b4ad795eb7f470b

              SHA256

              86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

              SHA512

              f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

            • memory/956-110-0x000001E0C9580000-0x000001E0C9635000-memory.dmp

              Filesize

              724KB

            • memory/2932-47-0x0000017F70F50000-0x0000017F70F72000-memory.dmp

              Filesize

              136KB

            • memory/2932-48-0x0000017F71430000-0x0000017F71474000-memory.dmp

              Filesize

              272KB

            • memory/2932-49-0x0000017F71500000-0x0000017F71576000-memory.dmp

              Filesize

              472KB

            • memory/3980-81-0x0000020B653F0000-0x0000020B654A5000-memory.dmp

              Filesize

              724KB

            • memory/3980-84-0x0000020B65340000-0x0000020B6534A000-memory.dmp

              Filesize

              40KB

            • memory/3980-85-0x0000020B654F0000-0x0000020B6550A000-memory.dmp

              Filesize

              104KB

            • memory/3980-86-0x0000020B654B0000-0x0000020B654B8000-memory.dmp

              Filesize

              32KB

            • memory/3980-87-0x0000020B654C0000-0x0000020B654C6000-memory.dmp

              Filesize

              24KB

            • memory/3980-88-0x0000020B65510000-0x0000020B6551A000-memory.dmp

              Filesize

              40KB

            • memory/3980-83-0x0000020B654D0000-0x0000020B654EC000-memory.dmp

              Filesize

              112KB

            • memory/3980-82-0x0000020B65330000-0x0000020B6533A000-memory.dmp

              Filesize

              40KB

            • memory/3980-80-0x0000020B65350000-0x0000020B6536C000-memory.dmp

              Filesize

              112KB

            • memory/4664-133-0x0000028AF30C0000-0x0000028AF3175000-memory.dmp

              Filesize

              724KB

            • memory/4664-134-0x0000028AF3000000-0x0000028AF302A000-memory.dmp

              Filesize

              168KB

            • memory/4664-135-0x0000028AF3000000-0x0000028AF3024000-memory.dmp

              Filesize

              144KB