Analysis

  • max time kernel
    119s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 01:35

General

  • Target

    2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe

  • Size

    2.9MB

  • MD5

    783c6c51d2ea781d065bea1801241650

  • SHA1

    cdb67c19a6d4177aa51f3cda66e08026a90e27e6

  • SHA256

    55359047b2ba78d96cf00b4cd57445e7b68e7b0752f42a31805bf94f3f689ebf

  • SHA512

    318daceee5bcfebdf385759ada5eb6aa08189b810c49cb75809b0be16c770d924cd94808fbc011c103616bb3199f6768bf703f6d1128294196b1ff8776e3cf8e

  • SSDEEP

    49152:OiQagHg5EVhwQd+qrW+i1w+Tqc0KxZbDOCwMDbyeKw3FGMFvfjPW21I3iIJS:bg7hRdj9iMlHBSFBWZS

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

RMMTest

C2

http://meshcentral.com:443/agent.ashx

Attributes
  • mesh_id

    0x36BCDD2BF134B3D2E0FF25BB329B4F57FF9F3B1CF6BE4AF56F50C0BC68C3113E24A5FA864D4BC9B58D873279FB76BA04

  • server_id

    D01B0463C0C9E38D81254F7B22DD4DAD848302AEF186BFCFF1D61F4F73846D6F8C8C94D01D3CF1EACA3836F8E5D316A4

  • wss

    wss://meshcentral.com:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2100
    • C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-15_783c6c51d2ea781d065bea1801241650_ismagent_ryuk_sliver.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "Get-Module -ListAvailable -Name netsecurity"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "New-NetFirewallRule -Action Allow -Description \"Mesh Central Agent Management Traffic\" -Direction Inbound -DisplayName \"Mesh Agent Management Traffic (TCP-1)\" -DynamicTarget Any -EdgeTraversalPolicy Allow -Enabled True -InterfaceType Any -LocalPort 16990 -Profile \"Public, Private, Domain\" -Program \"C:\Program Files\Mesh Agent\MeshAgent.exe\" -Protocol TCP"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3468
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "New-NetFirewallRule -Action Allow -Description \"Mesh Central Agent Management Traffic\" -Direction Inbound -DisplayName \"Mesh Agent Management Traffic (TCP-2)\" -DynamicTarget Any -EdgeTraversalPolicy Allow -Enabled True -InterfaceType Any -LocalPort 16991 -Profile \"Public, Private, Domain\" -Program \"C:\Program Files\Mesh Agent\MeshAgent.exe\" -Protocol TCP"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4552
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "New-NetFirewallRule -Action Allow -Description \"Mesh Central Agent Peer-to-Peer Traffic\" -Direction Inbound -DisplayName \"Mesh Agent Peer-to-Peer Traffic (UDP-1)\" -DynamicTarget Any -EdgeTraversalPolicy Allow -Enabled True -InterfaceType Any -LocalPort 16990 -Profile \"Public, Private, Domain\" -Program \"C:\Program Files\Mesh Agent\MeshAgent.exe\" -Protocol UDP"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4720
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "New-NetFirewallRule -Action Allow -Description \"Mesh Central Agent Peer-to-Peer Traffic\" -Direction Inbound -DisplayName \"Mesh Agent Peer-to-Peer Traffic (UDP-2)\" -DynamicTarget Any -EdgeTraversalPolicy Allow -Enabled True -InterfaceType Any -LocalPort 16991 -Profile \"Public, Private, Domain\" -Program \"C:\Program Files\Mesh Agent\MeshAgent.exe\" -Protocol UDP"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3412
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-2878641211-696417878-3864914810-1000"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Mesh Agent\MeshAgent.exe

    Filesize

    2.9MB

    MD5

    783c6c51d2ea781d065bea1801241650

    SHA1

    cdb67c19a6d4177aa51f3cda66e08026a90e27e6

    SHA256

    55359047b2ba78d96cf00b4cd57445e7b68e7b0752f42a31805bf94f3f689ebf

    SHA512

    318daceee5bcfebdf385759ada5eb6aa08189b810c49cb75809b0be16c770d924cd94808fbc011c103616bb3199f6768bf703f6d1128294196b1ff8776e3cf8e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    b5f63423f55e96fabcd1b186b27ce0c4

    SHA1

    581b488265a2f159836409853f4b97eb5941bd48

    SHA256

    451cd58d101dc6219943589eedc0789ff95f35be417f63555ebde5d354e7c11a

    SHA512

    f1e9873c6c88964035589f1dbfa28bff55315a66d471e69332f96c837855252187b719d5660baee2d5e3bb5d86b8c42e54826546b6e0d949010a6c7d2facadeb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    235a8eb126d835efb2e253459ab8b089

    SHA1

    293fbf68e6726a5a230c3a42624c01899e35a89f

    SHA256

    5ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686

    SHA512

    a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    fc08d9efbf45b4045fdf2cfc507ddceb

    SHA1

    7a1095765f0b9ed6a04afeb084f4e78cc25aed5c

    SHA256

    b11437cfbe0773154d082440842d8754f31a0ff920b86a1c518cefbe9e0bc92e

    SHA512

    2f765d087a043d05720445383409bbab5f2a17f46c10257589a94a8dfa22e5888692879d25df2e78192e6a226ad3c44921689104a3e40f2a45ffe2cc0ba10571

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    4a0a79d047c5e2bea74178ca85f21888

    SHA1

    0ea1e123ef9b3a9aa56daf8fa88398ecdb46c7c0

    SHA256

    0f4c1befe446987c80d4cdc4fe547a2cf7bf37fb5f743a67f16e91946ed37055

    SHA512

    39263e2c2dfc750a12304517f7609b8d975fc37c99b8e0c257e382266f5ebe073e7585cace80b6dd45a6e53f17ff5de2f9a5783b6668f01eca1ec80b62b9378a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    f32108506a146554ed4bebd8170d7907

    SHA1

    394cdb965aa79bb1d3fa27238a4b53d33276f20f

    SHA256

    047b9f111679c50fa6fe2a4d9f8bcd6cc2d92d18d31bdc27fce9f1b2ecc8a30e

    SHA512

    a794efffca6aeff461f547ee81648e03d350672c3fd5b45774c56dc32eee57b8c099eb0da5acf6b86f7e852bd2aa8f80cdd63635f9afd8a58c219bf756e3d47b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gwv21ufa.xbq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\CF9286F82ED92F5927D39345FAB14F9FB03429A4

    Filesize

    1KB

    MD5

    2e04bab0eb91c469c1011e76bc84461e

    SHA1

    640488e028dde75420cc3d3b8f8f9e132a7ba1e3

    SHA256

    ec1a8dd6701f2329ac17f2d2e3b4f71ba795d2151eb7b5c95eacc34494395c7f

    SHA512

    8247276d2ff3dd5e6e35dfa2e46427991d39b12c164ff549da39615ecaf99ef9c0c1f54a626ef24aacc57055796af903bfe2a23fc92f07ea84d9e3089d2242cb

  • memory/3480-2-0x000001E8C3600000-0x000001E8C3622000-memory.dmp

    Filesize

    136KB

  • memory/3480-21-0x000001E8C39A0000-0x000001E8C39AE000-memory.dmp

    Filesize

    56KB

  • memory/3480-22-0x000001E8C39D0000-0x000001E8C39EA000-memory.dmp

    Filesize

    104KB