Analysis

  • max time kernel
    133s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 01:50

General

  • Target

    2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe

  • Size

    2.9MB

  • MD5

    783c6c51d2ea781d065bea1801241650

  • SHA1

    cdb67c19a6d4177aa51f3cda66e08026a90e27e6

  • SHA256

    55359047b2ba78d96cf00b4cd57445e7b68e7b0752f42a31805bf94f3f689ebf

  • SHA512

    318daceee5bcfebdf385759ada5eb6aa08189b810c49cb75809b0be16c770d924cd94808fbc011c103616bb3199f6768bf703f6d1128294196b1ff8776e3cf8e

  • SSDEEP

    49152:OiQagHg5EVhwQd+qrW+i1w+Tqc0KxZbDOCwMDbyeKw3FGMFvfjPW21I3iIJS:bg7hRdj9iMlHBSFBWZS

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

RMMTest

C2

http://meshcentral.com:443/agent.ashx

Attributes
  • mesh_id

    0x36BCDD2BF134B3D2E0FF25BB329B4F57FF9F3B1CF6BE4AF56F50C0BC68C3113E24A5FA864D4BC9B58D873279FB76BA04

  • server_id

    D01B0463C0C9E38D81254F7B22DD4DAD848302AEF186BFCFF1D61F4F73846D6F8C8C94D01D3CF1EACA3836F8E5D316A4

  • wss

    wss://meshcentral.com:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "Get-Module -ListAvailable -Name netsecurity"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2828
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {14247d4b-832b-4388-774f-173fbd08de42}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {14247d4b-832b-4388-774f-173fbd08de42}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2784
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {eead51bf-ef9f-4791-9213-95fcf53b011e}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {eead51bf-ef9f-4791-9213-95fcf53b011e}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2632
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {833d4653-f5cf-4f99-9981-c1cdc6b32868}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {833d4653-f5cf-4f99-9981-c1cdc6b32868}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2292
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {1bbd251e-59bc-459b-c566-4dfd2db665fb}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {1bbd251e-59bc-459b-c566-4dfd2db665fb}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:848
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-3533259084-2542256011-65585152-1000"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Mesh Agent\MeshAgent.exe

    Filesize

    2.9MB

    MD5

    783c6c51d2ea781d065bea1801241650

    SHA1

    cdb67c19a6d4177aa51f3cda66e08026a90e27e6

    SHA256

    55359047b2ba78d96cf00b4cd57445e7b68e7b0752f42a31805bf94f3f689ebf

    SHA512

    318daceee5bcfebdf385759ada5eb6aa08189b810c49cb75809b0be16c770d924cd94808fbc011c103616bb3199f6768bf703f6d1128294196b1ff8776e3cf8e

  • memory/2828-6-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

    Filesize

    2.9MB

  • memory/2828-7-0x0000000001DD0000-0x0000000001DD8000-memory.dmp

    Filesize

    32KB