Analysis
-
max time kernel
117s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 16:32
Behavioral task
behavioral1
Sample
2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250207-en
General
-
Target
2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe
-
Size
2.9MB
-
MD5
0ba08e83f23bdf195ecb6e0d681715db
-
SHA1
4ffa63849860be780e8b36cb9d02cee5e180b910
-
SHA256
6a313284fe5ee24afd20fdca09dc1cba93cb4277ee20b331a96162302409f369
-
SHA512
2e305fc2284bcbde1cd07605f7355091fe2b9869fd33bf00963ae45db055049474bd8fb2f72c27ba58acd459cfe7bbc904a48ad2bd0d2e2992f50dd3e073c4b0
-
SSDEEP
49152:hyEEFoRjQ86ctQAWrk9k+PhBFB3FFIBoYCIYSMFvf0VQc9pdQPN:hnj36pUk0TkfYiQ/N
Malware Config
Extracted
meshagent
2
Sports & Imports
http://98.187.161.247:443/agent.ashx
-
mesh_id
0x5982E46AAA9F472859A5D4B8797C454B63141A8A669BF3C8A5BF92591AAAB614D4942ABE505C5CB9CCA851A5C024E8F6
-
server_id
9FCE958DB8A0A03D0881F53B35F97C67DA857CA4B2CD1231F92046A2A9727EB27BE1F081E4C9B7AA8AB4D4E455DCC97D
-
wss
wss://98.187.161.247:443/agent.ashx
Signatures
-
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016c60-18.dat family_meshagent -
Meshagent family
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 2688 netsh.exe 2668 netsh.exe 2140 netsh.exe 1564 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" --installedByUser=\"S-1-5-21-677481364-2238709445-1347953534-1000\"" 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe -
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 3032 MeshAgent.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Mesh Agent\MeshAgent.exe 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.log MeshAgent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1944 wmic.exe Token: SeSecurityPrivilege 1944 wmic.exe Token: SeTakeOwnershipPrivilege 1944 wmic.exe Token: SeLoadDriverPrivilege 1944 wmic.exe Token: SeSystemProfilePrivilege 1944 wmic.exe Token: SeSystemtimePrivilege 1944 wmic.exe Token: SeProfSingleProcessPrivilege 1944 wmic.exe Token: SeIncBasePriorityPrivilege 1944 wmic.exe Token: SeCreatePagefilePrivilege 1944 wmic.exe Token: SeBackupPrivilege 1944 wmic.exe Token: SeRestorePrivilege 1944 wmic.exe Token: SeShutdownPrivilege 1944 wmic.exe Token: SeDebugPrivilege 1944 wmic.exe Token: SeSystemEnvironmentPrivilege 1944 wmic.exe Token: SeRemoteShutdownPrivilege 1944 wmic.exe Token: SeUndockPrivilege 1944 wmic.exe Token: SeManageVolumePrivilege 1944 wmic.exe Token: 33 1944 wmic.exe Token: 34 1944 wmic.exe Token: 35 1944 wmic.exe Token: SeIncreaseQuotaPrivilege 1944 wmic.exe Token: SeSecurityPrivilege 1944 wmic.exe Token: SeTakeOwnershipPrivilege 1944 wmic.exe Token: SeLoadDriverPrivilege 1944 wmic.exe Token: SeSystemProfilePrivilege 1944 wmic.exe Token: SeSystemtimePrivilege 1944 wmic.exe Token: SeProfSingleProcessPrivilege 1944 wmic.exe Token: SeIncBasePriorityPrivilege 1944 wmic.exe Token: SeCreatePagefilePrivilege 1944 wmic.exe Token: SeBackupPrivilege 1944 wmic.exe Token: SeRestorePrivilege 1944 wmic.exe Token: SeShutdownPrivilege 1944 wmic.exe Token: SeDebugPrivilege 1944 wmic.exe Token: SeSystemEnvironmentPrivilege 1944 wmic.exe Token: SeRemoteShutdownPrivilege 1944 wmic.exe Token: SeUndockPrivilege 1944 wmic.exe Token: SeManageVolumePrivilege 1944 wmic.exe Token: 33 1944 wmic.exe Token: 34 1944 wmic.exe Token: 35 1944 wmic.exe Token: SeDebugPrivilege 2956 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1944 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 31 PID 1968 wrote to memory of 1944 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 31 PID 1968 wrote to memory of 1944 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 31 PID 1968 wrote to memory of 2400 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 34 PID 1968 wrote to memory of 2400 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 34 PID 1968 wrote to memory of 2400 1968 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 34 PID 2400 wrote to memory of 2956 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 36 PID 2400 wrote to memory of 2956 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 36 PID 2400 wrote to memory of 2956 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 36 PID 2400 wrote to memory of 2216 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 39 PID 2400 wrote to memory of 2216 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 39 PID 2400 wrote to memory of 2216 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 39 PID 2216 wrote to memory of 2688 2216 cmd.exe 41 PID 2216 wrote to memory of 2688 2216 cmd.exe 41 PID 2216 wrote to memory of 2688 2216 cmd.exe 41 PID 2400 wrote to memory of 2780 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 42 PID 2400 wrote to memory of 2780 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 42 PID 2400 wrote to memory of 2780 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 42 PID 2780 wrote to memory of 2668 2780 cmd.exe 44 PID 2780 wrote to memory of 2668 2780 cmd.exe 44 PID 2780 wrote to memory of 2668 2780 cmd.exe 44 PID 2400 wrote to memory of 852 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 45 PID 2400 wrote to memory of 852 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 45 PID 2400 wrote to memory of 852 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 45 PID 852 wrote to memory of 2140 852 cmd.exe 47 PID 852 wrote to memory of 2140 852 cmd.exe 47 PID 852 wrote to memory of 2140 852 cmd.exe 47 PID 2400 wrote to memory of 2728 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 48 PID 2400 wrote to memory of 2728 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 48 PID 2400 wrote to memory of 2728 2400 2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe 48 PID 2728 wrote to memory of 1564 2728 cmd.exe 50 PID 2728 wrote to memory of 1564 2728 cmd.exe 50 PID 2728 wrote to memory of 1564 2728 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe" -fullinstall2⤵
- Sets service image path in registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe/C "Get-Module -ListAvailable -Name netsecurity"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\cmd.exe/C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {08c9e045-6165-4a99-3b24-4e4a21123bc6}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990"3⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {08c9e045-6165-4a99-3b24-4e4a21123bc6}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=169904⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2688
-
-
-
C:\Windows\System32\cmd.exe/C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {06cbb670-c8c2-4d88-c7aa-a30a9f559c42}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991"3⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {06cbb670-c8c2-4d88-c7aa-a30a9f559c42}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=169914⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2668
-
-
-
C:\Windows\System32\cmd.exe/C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {1452961d-52b1-4a95-ab2e-4ee2fcfc6965}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990"3⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {1452961d-52b1-4a95-ab2e-4ee2fcfc6965}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=169904⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2140
-
-
-
C:\Windows\System32\cmd.exe/C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {04afc3c2-e059-4b96-a722-8a341e537334}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991"3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {04afc3c2-e059-4b96-a722-8a341e537334}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=169914⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1564
-
-
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-677481364-2238709445-1347953534-1000"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD50ba08e83f23bdf195ecb6e0d681715db
SHA14ffa63849860be780e8b36cb9d02cee5e180b910
SHA2566a313284fe5ee24afd20fdca09dc1cba93cb4277ee20b331a96162302409f369
SHA5122e305fc2284bcbde1cd07605f7355091fe2b9869fd33bf00963ae45db055049474bd8fb2f72c27ba58acd459cfe7bbc904a48ad2bd0d2e2992f50dd3e073c4b0