Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2025, 14:31

General

  • Target

    2025-01-28_8cd4a310e3c4f2ce52250eca4f2c630f_ismagent_ryuk_sliver.exe

  • Size

    2.9MB

  • MD5

    8cd4a310e3c4f2ce52250eca4f2c630f

  • SHA1

    2af4e53f40b5b28613d35c82b9768bc78d2fad56

  • SHA256

    aa89ac89659bffee9a9e8125f67df0c41ded196e282bcd9aa40bb703637a2527

  • SHA512

    3dcae80f39b429085d4b44aad6b3108e665a6d25e74694ef6730d171866abff60c55e7b4cb31f9520f8d825b041ddc7648aeac2977027bf4d4eb482567ef10d8

  • SSDEEP

    49152:kZFIlmhRYg1OziGQGRCv6da/KMvxZdAMBwQoxXXujOl4MPMFvfldPSFrXxn3l:jl7i86hR+fWMeP43l

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

050 Lisboa - Zonesoft

C2

http://fs1.suporte.com.pt:8943/agent.ashx

Attributes
  • mesh_id

    0x313CE7C3BD97BA4DE25768478CFB01C142A538B329BAAB8F6B3AB4F4FFEEC83BF0EBE45A831A8A61950A237224143E83

  • server_id

    0481CF775C2137A6BF13FF516D4E688220F467FB031867C5FBA7771274EA8996A04DF952EDD29FAA3F8190D6B3985533

  • wss

    wss://fs1.suporte.com.pt:8943/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-28_8cd4a310e3c4f2ce52250eca4f2c630f_ismagent_ryuk_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-28_8cd4a310e3c4f2ce52250eca4f2c630f_ismagent_ryuk_sliver.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2092
    • C:\Users\Admin\AppData\Local\Temp\2025-01-28_8cd4a310e3c4f2ce52250eca4f2c630f_ismagent_ryuk_sliver.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-28_8cd4a310e3c4f2ce52250eca4f2c630f_ismagent_ryuk_sliver.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "Get-Module -ListAvailable -Name netsecurity"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {c85e6465-8b41-419a-b9e4-a748bdc7c160}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {c85e6465-8b41-419a-b9e4-a748bdc7c160}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2736
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {1d811da2-8dd2-4c9b-fd06-922b4f61e3ae}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {1d811da2-8dd2-4c9b-fd06-922b4f61e3ae}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2640
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {8dc3dc88-74a4-4d93-1ea9-eda3ec1d93df}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {8dc3dc88-74a4-4d93-1ea9-eda3ec1d93df}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2636
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {1430d8a4-4972-4e94-a4ce-cb6a58f9198f}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {1430d8a4-4972-4e94-a4ce-cb6a58f9198f}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2756
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-312935884-697965778-3955649944-1000"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Mesh Agent\MeshAgent.exe

    Filesize

    2.9MB

    MD5

    8cd4a310e3c4f2ce52250eca4f2c630f

    SHA1

    2af4e53f40b5b28613d35c82b9768bc78d2fad56

    SHA256

    aa89ac89659bffee9a9e8125f67df0c41ded196e282bcd9aa40bb703637a2527

    SHA512

    3dcae80f39b429085d4b44aad6b3108e665a6d25e74694ef6730d171866abff60c55e7b4cb31f9520f8d825b041ddc7648aeac2977027bf4d4eb482567ef10d8

  • memory/2672-6-0x000000001B8A0000-0x000000001BB82000-memory.dmp

    Filesize

    2.9MB

  • memory/2672-7-0x0000000001E80000-0x0000000001E88000-memory.dmp

    Filesize

    32KB