Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 00:01

General

  • Target

    2024-11-11_42867209afb0cd3511bb6e8091ebc90f_frostygoop_luca-stealer_poet-rat_snatch.exe

  • Size

    7.1MB

  • MD5

    42867209afb0cd3511bb6e8091ebc90f

  • SHA1

    ae01caa6c329082baca3633e5189f018f6e64b31

  • SHA256

    354578664bb1086e7d9193fdd0374eda91bfed1546ca7325706a52a1a8d601f6

  • SHA512

    e6484b2e328e63066de87fb03d26f5b49456463705e396b2875525d508e62f4c64344c519a0834a2881672a8494650d6bfc162e137eb19cc2a8c62aa39d2c2ad

  • SSDEEP

    98304:SA47lMQl5tHuC+EoZEdA9rYmBprCfmzsDzs1lMI6jQ:SLMQl5kko7zXsKsvsDSQ

Malware Config

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-11_42867209afb0cd3511bb6e8091ebc90f_frostygoop_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-11_42867209afb0cd3511bb6e8091ebc90f_frostygoop_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]
      "C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]" -fullinstall
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:264
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:724
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2104
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1172
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:1980
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:1228
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:2712
        • C:\Program Files\Mesh Agent\MeshAgent.exe
          "C:\Program Files\Mesh Agent\MeshAgent.exe"
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:384
          • C:\Windows\System32\wbem\wmic.exe
            wmic SystemEnclosure get ChassisTypes
            2⤵
              PID:4764
            • C:\Windows\system32\wbem\wmic.exe
              wmic os get oslanguage /FORMAT:LIST
              2⤵
                PID:5004
              • C:\Windows\System32\wbem\wmic.exe
                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                2⤵
                  PID:4800
                • C:\Windows\System32\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                    PID:4832
                  • C:\Windows\System32\wbem\wmic.exe
                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                    2⤵
                      PID:4696
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -noprofile -nologo -command -
                      2⤵
                      • Drops file in System32 directory
                      • Command and Scripting Interpreter: PowerShell
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4172
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -noprofile -nologo -command -
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1668
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -noprofile -nologo -command -
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:976
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -noprofile -nologo -command -
                      2⤵
                      • Drops file in System32 directory
                      • Command and Scripting Interpreter: PowerShell
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1336
                    • C:\Windows\system32\cmd.exe
                      /c manage-bde -protectors -get C: -Type recoverypassword
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:380
                      • C:\Windows\system32\manage-bde.exe
                        manage-bde -protectors -get C: -Type recoverypassword
                        3⤵
                          PID:772
                      • C:\Windows\system32\cmd.exe
                        /c manage-bde -protectors -get F: -Type recoverypassword
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1724
                        • C:\Windows\system32\manage-bde.exe
                          manage-bde -protectors -get F: -Type recoverypassword
                          3⤵
                            PID:1308

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files\Mesh Agent\MeshAgent.db

                        Filesize

                        153KB

                        MD5

                        b7262cd197053444639042497dca3943

                        SHA1

                        7cbe8c44e64e4c6fe688b35af99874beb38a2586

                        SHA256

                        0365acbcbb9cd4d22a7aeca645bb5f0b8b326fd2a2f55d975b7713b85e4e6fe2

                        SHA512

                        23e081d1a393283d2f9b34239a6989e77a8754fff909a38718246fce8ebeff7425a049e4b5fc1ccb3d25aed1068a24af541c0a60fb3bd9623dd72e2e7efe5e07

                      • C:\Program Files\Mesh Agent\MeshAgent.msh

                        Filesize

                        31KB

                        MD5

                        aeacd4a02f8c57f5b2e295035089645b

                        SHA1

                        53358ad49431d9ff1333d190d8da7663980c100a

                        SHA256

                        66b7a8906d4b885846f72bfc90d552abb2c4c61bf722ee6bf40552c4c1081b4c

                        SHA512

                        15191dbfaf3d5b16f572eb1806cf102da6d915d70e67ce15eec744dd7c7b869c6174e1cc44763ac0b4b3154eb304172e00b4e9b1bd9e6e85364a76078ef0490e

                      • C:\Users\Admin\AppData\Roaming\meshagent64-ЭКРАНЫ[email protected]

                        Filesize

                        3.3MB

                        MD5

                        9c3de7192e8ed1f42790bee4b5356786

                        SHA1

                        5272b834e29e03c3c807aa2b6140c8180d1dc288

                        SHA256

                        6dfd22ca602fee5740548b2d61a54e224b790acfa3b412259790145566b52671

                        SHA512

                        41b59e32c8bc7240cf7ae415602a9e4d1d4e4b516bb35f3d09de1d2a87fa2a1f405cf30a4f797879188ea06026716426d383c65d237b68dd43ed96bc04093b8f

                      • C:\Windows\Temp\__PSScriptPolicyTest_inn3kdkd.z2m.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        3KB

                        MD5

                        06d16fea6ab505097d16fcaa32949d47

                        SHA1

                        0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                        SHA256

                        54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                        SHA512

                        03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        2KB

                        MD5

                        0df934cbb027c5e7f17d815e171877b5

                        SHA1

                        e9cc1c1df53071c90ddb0630bc28de8c3a6ecb7c

                        SHA256

                        b254b7f293ef76007f851bddd9056ddf636539b8ddfdcffe3a0b7721ddce11bd

                        SHA512

                        3b5403ce8676735117e19a8062c67f5b1298f06cec997af68d0210a719e0bb8364491941c356cf85fe9b1b102ade51c9e3b7094a8b4562606dcb56f76839ac79

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        2KB

                        MD5

                        2c0bdf06d302688498d4e7f9cd669ab5

                        SHA1

                        18186323d93499e03f737f137b4ad795eb7f470b

                        SHA256

                        86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

                        SHA512

                        f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

                      • C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1B30432103B6744DFCF7B376C283A5F56270D53F

                        Filesize

                        1KB

                        MD5

                        909b8357b6b8f91376874f2b68f4a5a1

                        SHA1

                        278f9f7761a3169f037a457b76bb5b83cc7784c6

                        SHA256

                        aa07fa2163b6f68b88537479bf9d4c5b803093636c11889a5cdb34062ed1010c

                        SHA512

                        88ce825e7bbf6f17b7d48e051037b3920f2b171222f66f209d196751e6803d08444058c0161535b35461551c6ef77b1dd78a59f73c300a6cc029a7431bdfda86

                      • memory/1336-141-0x0000015DD1990000-0x0000015DD19B4000-memory.dmp

                        Filesize

                        144KB

                      • memory/1336-140-0x0000015DD1990000-0x0000015DD19BA000-memory.dmp

                        Filesize

                        168KB

                      • memory/1336-139-0x0000015DD1A40000-0x0000015DD1AF5000-memory.dmp

                        Filesize

                        724KB

                      • memory/1668-87-0x0000029CC8C60000-0x0000029CC8C7C000-memory.dmp

                        Filesize

                        112KB

                      • memory/1668-89-0x0000029CC8BC0000-0x0000029CC8BCA000-memory.dmp

                        Filesize

                        40KB

                      • memory/1668-90-0x0000029CC8DE0000-0x0000029CC8DFC000-memory.dmp

                        Filesize

                        112KB

                      • memory/1668-91-0x0000029CC8C80000-0x0000029CC8C8A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1668-92-0x0000029CC8E20000-0x0000029CC8E3A000-memory.dmp

                        Filesize

                        104KB

                      • memory/1668-98-0x0000029CC8C90000-0x0000029CC8C98000-memory.dmp

                        Filesize

                        32KB

                      • memory/1668-103-0x0000029CC8E00000-0x0000029CC8E06000-memory.dmp

                        Filesize

                        24KB

                      • memory/1668-104-0x0000029CC8E10000-0x0000029CC8E1A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1668-88-0x0000029CC8D20000-0x0000029CC8DD5000-memory.dmp

                        Filesize

                        724KB

                      • memory/4172-62-0x00000258ED170000-0x00000258ED1E6000-memory.dmp

                        Filesize

                        472KB

                      • memory/4172-61-0x00000258ED0A0000-0x00000258ED0E4000-memory.dmp

                        Filesize

                        272KB

                      • memory/4172-51-0x00000258ECBE0000-0x00000258ECC02000-memory.dmp

                        Filesize

                        136KB