Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-fr
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-frlocale:fr-fros:windows10-2004-x64systemwindows
  • submitted
    03/12/2024, 10:45

General

  • Target

    trmm-techniquepc-marseille-server-amd64.exe

  • Size

    5.0MB

  • MD5

    d688de20751030ba2fb80c7c081ee6ce

  • SHA1

    348a9a7efd476efb7f5c0ca6810692662a5df959

  • SHA256

    9de4cdfbc6ea911a5c46feeaf8ec5cebef99ff9e3fe0789798d9eb8103560817

  • SHA512

    21ea43be0a24ccb2e4d760e0433de22f20019acf70a4431e0e98ca1161ba436f156da26c8e9bef768cad75cd5ce9c0c015366c4d0865313c2b5cb98ad4942b74

  • SSDEEP

    49152:N0dV40e2i1Urb/TcvO90d7HjmAFd4A64nsfJCFgH1bmpbz+p8ZmbXiPZkcR+iy5h:ue2i1LGEnZswkcc9E/+ev2

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.technique-pc.fr:443/agent.ashx

Attributes
  • mesh_id

    0x16E0F1CB5B4BA4DDFE30A17FF5FD1BE16DBDA9308E4F71A0F420ABA9C690ACB868F7524DB40934EC2462590125D8F61F

  • server_id

    58CCE4E2C0143714844002334586A082CB580F81BEA2CAB66BAEB5B08D334DF97FCB43422526EC765508EC51B0D098E5

  • wss

    wss://mesh.technique-pc.fr:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\trmm-techniquepc-marseille-server-amd64.exe
    "C:\Users\Admin\AppData\Local\Temp\trmm-techniquepc-marseille-server-amd64.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe
      C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\is-I3A11.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-I3A11.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$E010C,3660179,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2624
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4464
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4412
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3472
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:3336
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:5112
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1408
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3140
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1080
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1804
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3836
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:2692
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4856
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4784
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2648
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2728
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2944
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3996
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.technique-pc.fr --client-id 1 --site-id 1 --agent-type server --auth 4597e77afbed888fa9d63e97397f09a591a459c8997484675786c84083f7f04e
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4888
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:4540
      • C:\Program Files\Mesh Agent\MeshAgent.exe
        "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
        3⤵
        • Executes dropped EXE
        PID:3160
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    PID:2104
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5000
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4680
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4368
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:3404
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:3504
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:1428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:3416
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:1064
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4960
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4904
          • C:\Windows\system32\cmd.exe
            /c manage-bde -protectors -get C: -Type recoverypassword
            2⤵
              PID:888
              • C:\Windows\system32\manage-bde.exe
                manage-bde -protectors -get C: -Type recoverypassword
                3⤵
                  PID:3868
              • C:\Windows\system32\cmd.exe
                /c manage-bde -protectors -get F: -Type recoverypassword
                2⤵
                  PID:3388
                  • C:\Windows\system32\manage-bde.exe
                    manage-bde -protectors -get F: -Type recoverypassword
                    3⤵
                      PID:3660
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                  1⤵
                  • Executes dropped EXE
                  PID:3360

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

                  Filesize

                  153KB

                  MD5

                  4e5b1a61ab334aa64f672b6734f1f62d

                  SHA1

                  bc413a7fb1510857f639ece7cdb1e89f230f5dfc

                  SHA256

                  c98521e060414ea8a7e00c353da3de625a85b22e8c132998709f04836e9c138b

                  SHA512

                  79b3a56bb7ece1597cca7a6f7bc64f82a056e717a7f55ce09f87191a9a96f3f99c687aeef410d8a4ebafd0ced6ac523a0af53e51146090d4724304aa5f44aa31

                • C:\Program Files\TacticalAgent\meshagent.exe

                  Filesize

                  3.3MB

                  MD5

                  cd927d7b1239092bd3def1c83692be03

                  SHA1

                  65dcd1332338464347c99e5cb5658cf84b0330e5

                  SHA256

                  dab3a014fed11cac83e4ab92c3e82be20ca8b12becaa5ee4409e73fdc0ae76e7

                  SHA512

                  b53dcbfde2d0614c00b2e7253c938e7c4ff3703024534cd1a0cbfa43aa2e848fbbc328ab3bc6f40ba3060fc9170cbf57e33cb3677d61327e291789bd9e756f71

                • C:\Program Files\TacticalAgent\tacticalrmm.exe

                  Filesize

                  3.6MB

                  MD5

                  250df3a793c8ba4c155fa4c6045bdcd0

                  SHA1

                  4049fd764bb5b2db09751652ebb384b070ed54e4

                  SHA256

                  20d46cb97105f952ad306f1e545a71117978718f7d67cce45a426f9a3ca726a8

                  SHA512

                  a0ad46db83a237ed13f95598fd4aa788abea8080c60036b983dd0066b4d756361f38de08aa4423aa326114e1cf0e30914d1071571437754598d4fa653f8e81cf

                • C:\Program Files\TacticalAgent\tacticalrmm.exe

                  Filesize

                  9.2MB

                  MD5

                  bb383b7c3d5e4acb1001ab099b5b0f3c

                  SHA1

                  cb0c85f84a454aa4b1aab02bfba47c4355c2311e

                  SHA256

                  a6d3159c858aa3704f35d69b27829618ad0d1bae894c848a5233100c17464f95

                  SHA512

                  157dda96d1cacea55a6be27b9d432225b47d7334e664e577cef82a14c7eb1be1b8b84423b3905a4c1caecb5394be264d9b5c3e32109a4893e51a9d406ce740be

                • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe

                  Filesize

                  4.3MB

                  MD5

                  2f046950e65922336cd83bf0dbc9de33

                  SHA1

                  ddc64a8b21c8146c93c0b19c1eeb0ef784b980c6

                  SHA256

                  412e1f600251b21911c582e69381f677e663231f5e1d10786d88a026e00ea811

                  SHA512

                  a11cbf8b8b692d2d5a0e3af5a97f91a3d1f3e7aa39966eb7d62b3244b3913f2fdc21823d5c94de0d98e579f801709df44433af91567356361d5d9699a93b2cbc

                • C:\Users\Admin\AppData\Local\Temp\is-I3A11.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

                  Filesize

                  3.0MB

                  MD5

                  a639312111d278fee4f70299c134d620

                  SHA1

                  6144ca6e18a5444cdb9b633a6efee67aff931115

                  SHA256

                  4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

                  SHA512

                  f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

                • C:\Windows\Temp\__PSScriptPolicyTest_gzoil421.mok.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  06d16fea6ab505097d16fcaa32949d47

                  SHA1

                  0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                  SHA256

                  54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                  SHA512

                  03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  94eaa510e77fa7f7cda2c021154365e1

                  SHA1

                  d1f0761d4201658ba12d427f0c5bae9131e12725

                  SHA256

                  d78ba051fe6068938be6f937614d33a7981a666227daa84c5dd5a2c8574660f9

                  SHA512

                  0138c6d0bda836948119b8b54fa84e49b3c659f6e76454c82d830fbd6fc386be7d113b4ff9c71c090b82fdb0b562e9c3cb175f55fc4e5b250cdd2eb1d53bd0a1

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  641f0f4af3992107adf4240f7edb7e93

                  SHA1

                  4fc860139f9a15e5cc61f67e04fe70086e77f146

                  SHA256

                  18ebd850665da22f2f5a0be926a249549ed72bbb4ade91b9fb1765ecd8b1386b

                  SHA512

                  92e6739bd55aa90c101e573591fbfad359bdda03c3a4a46d32d00c4b11f0813af5c1f78cfd2d5ffb0263a0397b5cdb11cf81b701435e6895d20a0d261be81ea9

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  2c0bdf06d302688498d4e7f9cd669ab5

                  SHA1

                  18186323d93499e03f737f137b4ad795eb7f470b

                  SHA256

                  86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

                  SHA512

                  f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

                • memory/1064-106-0x0000015FCCBA0000-0x0000015FCCBBA000-memory.dmp

                  Filesize

                  104KB

                • memory/1064-105-0x0000015FCCA00000-0x0000015FCCA0A000-memory.dmp

                  Filesize

                  40KB

                • memory/1064-109-0x0000015FCCA50000-0x0000015FCCA5A000-memory.dmp

                  Filesize

                  40KB

                • memory/1064-108-0x0000015FCCA40000-0x0000015FCCA46000-memory.dmp

                  Filesize

                  24KB

                • memory/1064-107-0x0000015FCCA10000-0x0000015FCCA18000-memory.dmp

                  Filesize

                  32KB

                • memory/1064-101-0x0000015FCC9E0000-0x0000015FCC9FC000-memory.dmp

                  Filesize

                  112KB

                • memory/1064-102-0x0000015FCCAE0000-0x0000015FCCB95000-memory.dmp

                  Filesize

                  724KB

                • memory/1064-103-0x0000015FCA510000-0x0000015FCA51A000-memory.dmp

                  Filesize

                  40KB

                • memory/1064-104-0x0000015FCCA20000-0x0000015FCCA3C000-memory.dmp

                  Filesize

                  112KB

                • memory/2808-24-0x0000000000400000-0x00000000004D7000-memory.dmp

                  Filesize

                  860KB

                • memory/2808-3-0x0000000000400000-0x00000000004D7000-memory.dmp

                  Filesize

                  860KB

                • memory/2808-6-0x0000000000401000-0x00000000004B7000-memory.dmp

                  Filesize

                  728KB

                • memory/2812-23-0x0000000000400000-0x0000000000712000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2812-10-0x0000000000400000-0x0000000000712000-memory.dmp

                  Filesize

                  3.1MB

                • memory/3416-68-0x000002A86D190000-0x000002A86D206000-memory.dmp

                  Filesize

                  472KB

                • memory/3416-57-0x000002A86CC00000-0x000002A86CC22000-memory.dmp

                  Filesize

                  136KB

                • memory/3416-67-0x000002A86D0C0000-0x000002A86D104000-memory.dmp

                  Filesize

                  272KB

                • memory/4904-153-0x000002374A930000-0x000002374A9E5000-memory.dmp

                  Filesize

                  724KB

                • memory/4904-154-0x000002374A9F0000-0x000002374AA1A000-memory.dmp

                  Filesize

                  168KB

                • memory/4904-155-0x000002374A9F0000-0x000002374AA14000-memory.dmp

                  Filesize

                  144KB