Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-02-2025 18:25

General

  • Target

    2025-02-16_9eb9c3fa9a8a4a673edf0e6b6057997c_ismagent_ryuk_sliver.exe

  • Size

    2.9MB

  • MD5

    9eb9c3fa9a8a4a673edf0e6b6057997c

  • SHA1

    6d3456442b8b8bd40b85a580b90011fb8aa4ca44

  • SHA256

    39a7fd947f44b1916b412937848dceefb9ee06a514d8f35740cf15ddff3f71bf

  • SHA512

    a4a41b0e8ee7feebb1221e984050ca8253f7747060f8cbf8038f683761340105e906fdda496f436ad1ca601aefb1f51db0d06901bbaf57cffba1300a5efee1df

  • SSDEEP

    49152:6iQagHg5EVhwQd+qrW+i1w+Tqc0KxZbDOCwMDbyeKw3FGMFvfjPW21I3iIJK:Pg7hRdj9iMlHBSFBWZK

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

family

C2

http://puta.dyndns.org:443/meshcentral/agent.ashx

Attributes
  • mesh_id

    0xD4A168AB85CC42538347307026CFA907128B771A898DC41A668CAD35BE7E04146D0E7D4B81049883102F751C8D282B70

  • server_id

    DF4AB92F3C8857999E467656003AE5A1785E8424F7659E7546274B911B930CAB20F5BCA3D8302EC6D3C5E7DFAC9F1A44

  • wss

    wss://puta.dyndns.org:443/meshcentral/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-16_9eb9c3fa9a8a4a673edf0e6b6057997c_ismagent_ryuk_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-16_9eb9c3fa9a8a4a673edf0e6b6057997c_ismagent_ryuk_sliver.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1244
    • C:\Users\Admin\AppData\Local\Temp\2025-02-16_9eb9c3fa9a8a4a673edf0e6b6057997c_ismagent_ryuk_sliver.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-02-16_9eb9c3fa9a8a4a673edf0e6b6057997c_ismagent_ryuk_sliver.exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        /C "Get-Module -ListAvailable -Name netsecurity"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {44bd9f5b-dfe9-4e97-8838-5fa68bf52398}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-1) {44bd9f5b-dfe9-4e97-8838-5fa68bf52398}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2732
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {67cb751c-0774-4a8b-7863-15189f3ab439}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Management Traffic (TCP-2) {67cb751c-0774-4a8b-7863-15189f3ab439}" action=allow description="Mesh Central Agent Management Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=TCP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2764
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {219c6398-c920-4a87-2e33-f41dcbdd2b2b}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-1) {219c6398-c920-4a87-2e33-f41dcbdd2b2b}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16990
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2056
      • C:\Windows\System32\cmd.exe
        /C "netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {9260cf49-2051-438d-b0c2-6013944e3eb9}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Mesh Agent Peer-to-Peer Traffic (UDP-2) {9260cf49-2051-438d-b0c2-6013944e3eb9}" action=allow description="Mesh Central Agent Peer-to-Peer Traffic" dir=in program="C:\Program Files\Mesh Agent\MeshAgent.exe" protocol=UDP profile="public,private,domain" interfacetype=any edge=yes localport=16991
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:1520
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-3692679935-4019334568-335155002-1000"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Mesh Agent\MeshAgent.exe

    Filesize

    2.9MB

    MD5

    9eb9c3fa9a8a4a673edf0e6b6057997c

    SHA1

    6d3456442b8b8bd40b85a580b90011fb8aa4ca44

    SHA256

    39a7fd947f44b1916b412937848dceefb9ee06a514d8f35740cf15ddff3f71bf

    SHA512

    a4a41b0e8ee7feebb1221e984050ca8253f7747060f8cbf8038f683761340105e906fdda496f436ad1ca601aefb1f51db0d06901bbaf57cffba1300a5efee1df

  • memory/2816-6-0x000000001B330000-0x000000001B612000-memory.dmp

    Filesize

    2.9MB

  • memory/2816-7-0x0000000001E50000-0x0000000001E58000-memory.dmp

    Filesize

    32KB