Analysis

  • max time kernel
    121s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 16:23

General

  • Target

    2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe

  • Size

    2.9MB

  • MD5

    0ba08e83f23bdf195ecb6e0d681715db

  • SHA1

    4ffa63849860be780e8b36cb9d02cee5e180b910

  • SHA256

    6a313284fe5ee24afd20fdca09dc1cba93cb4277ee20b331a96162302409f369

  • SHA512

    2e305fc2284bcbde1cd07605f7355091fe2b9869fd33bf00963ae45db055049474bd8fb2f72c27ba58acd459cfe7bbc904a48ad2bd0d2e2992f50dd3e073c4b0

  • SSDEEP

    49152:hyEEFoRjQ86ctQAWrk9k+PhBFB3FFIBoYCIYSMFvf0VQc9pdQPN:hnj36pUk0TkfYiQ/N

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

Sports & Imports

C2

http://98.187.161.247:443/agent.ashx

Attributes
  • mesh_id

    0x5982E46AAA9F472859A5D4B8797C454B63141A8A669BF3C8A5BF92591AAAB614D4942ABE505C5CB9CCA851A5C024E8F6

  • server_id

    9FCE958DB8A0A03D0881F53B35F97C67DA857CA4B2CD1231F92046A2A9727EB27BE1F081E4C9B7AA8AB4D4E455DCC97D

  • wss

    wss://98.187.161.247:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2420
    • C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-02-14_0ba08e83f23bdf195ecb6e0d681715db_ismagent_ryuk_sliver.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "Get-Module -ListAvailable -Name netsecurity"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2880
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {61135c2a-2f69-4c98-df7c-a7b74d7d8b35}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {61135c2a-2f69-4c98-df7c-a7b74d7d8b35}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2152
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {7535f1d0-8f8e-4586-1f9e-bb45a0f54744}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {7535f1d0-8f8e-4586-1f9e-bb45a0f54744}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2804
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {d2048db7-448e-4b91-d042-1dad7624ee01}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {d2048db7-448e-4b91-d042-1dad7624ee01}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:1872
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {aeec8e0b-32e8-4887-2b69-63e928630ec3}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {aeec8e0b-32e8-4887-2b69-63e928630ec3}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:1812
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-3290804112-2823094203-3137964600-1000"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Mesh Agent\MeshAgent.exe

    Filesize

    2.9MB

    MD5

    0ba08e83f23bdf195ecb6e0d681715db

    SHA1

    4ffa63849860be780e8b36cb9d02cee5e180b910

    SHA256

    6a313284fe5ee24afd20fdca09dc1cba93cb4277ee20b331a96162302409f369

    SHA512

    2e305fc2284bcbde1cd07605f7355091fe2b9869fd33bf00963ae45db055049474bd8fb2f72c27ba58acd459cfe7bbc904a48ad2bd0d2e2992f50dd3e073c4b0

  • memory/2880-6-0x000000001B8A0000-0x000000001BB82000-memory.dmp

    Filesize

    2.9MB

  • memory/2880-7-0x0000000001D70000-0x0000000001D78000-memory.dmp

    Filesize

    32KB