Analysis

  • max time kernel
    17s
  • max time network
    24s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/04/2025, 18:55

General

  • Target

    meshagent64-test (7).exe

  • Size

    3.3MB

  • MD5

    0375b9bc8048fff72a08872c0992ca2c

  • SHA1

    0b8bf91a63cb2a814c14ff87f86957b7993c1ea8

  • SHA256

    9902d605b851b3bb44d6d0fa6f1b9d46839a2e05836a661f7747d4ca27a6e000

  • SHA512

    84f1443088d74f0983179fb6602644fd75ca8e62dbf29727b07a8d85d4ddbf939a43cd059728273d870237fc954c445686b66d47ff1c7f512aecb979c098b9a1

  • SSDEEP

    49152:VdZEy2B6vflQf6X8uZQoy3vR6QVQy5Z+bm4M/HMFvfGW0/7Z7Ib3jxw5b+:nHvfGfZvZj1/N/z/owJ+

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

test

C2

http://81.199.130.130:443/agent.ashx

Attributes
  • mesh_id

    0x47DDDC52FC2F31C47AD1DB7EB4B7C5D38C64AAD2FC943360B44270FE0EA5E8B1A96E47D75411E0868F92FE77C2BFBAD0

  • server_id

    C3CEF30878AE341001284FF387E3BB7A7922403931F7265230ABB853B779EF5C3E73D0B368F566EC7B73BFB88E64D995

  • wss

    wss://81.199.130.130:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\meshagent64-test (7).exe
    "C:\Users\Admin\AppData\Local\Temp\meshagent64-test (7).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Users\Admin\AppData\Local\Temp\meshagent64-test (7).exe
      "C:\Users\Admin\AppData\Local\Temp\meshagent64-test (7).exe" -fullinstall
      2⤵
      • Sets service image path in registry
      • Drops file in Program Files directory
      PID:5160
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -noprofile -nologo -command -
      2⤵
      • Drops file in System32 directory
      • Command and Scripting Interpreter: PowerShell
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5912
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -noprofile -nologo -command -
      2⤵
      • Drops file in System32 directory
      • Command and Scripting Interpreter: PowerShell
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4456
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -noprofile -nologo -command -
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -noprofile -nologo -command -
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:560
    • C:\Windows\system32\cmd.exe
      /c manage-bde -protectors -get C: -Type recoverypassword
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3148
      • C:\Windows\system32\manage-bde.exe
        manage-bde -protectors -get C: -Type recoverypassword
        3⤵
          PID:5252
      • C:\Windows\system32\cmd.exe
        /c manage-bde -protectors -get F: -Type recoverypassword
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5436
        • C:\Windows\system32\manage-bde.exe
          manage-bde -protectors -get F: -Type recoverypassword
          3⤵
            PID:4568
        • C:\Program Files\Mesh Agent\MeshAgent.exe
          -kvm1
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Mesh Agent\MeshAgent.db

        Filesize

        154KB

        MD5

        64dede7f89c8db42585703fb6a5d3060

        SHA1

        6390b3fbcfa56f8428bd52b27d5496eb694c49f8

        SHA256

        f3c78ab97b37276c4c1f4e33fdc1231e02f13cbed7ee4f405aeee91f07ba3d14

        SHA512

        9411829040540410588abfc1c1add4026a35d80242c32e1a4e35d3cb44e332b0d4942ca5f440357a3f2aa22dad8d7469692038d59dbcd64571a1f39eaaaa1653

      • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

        Filesize

        154KB

        MD5

        85307f76df2f6e3b25518e1e7c6fe96c

        SHA1

        593898152b61c85f8943ae54874fc94ccc13e94e

        SHA256

        46586b2356946ceb60faf417f2d5eba4941b91a8ea8c8668053300a9cf0d3090

        SHA512

        db3e17e41c9a80e027dc7d1c6d3d4ca94d958e9cb61e6ae9b81442a81a0addaa1078db1c6b483b8a3e3e463c5ceadacc9bc744f245c30a93bb6c78cd3dd48aa7

      • C:\Program Files\Mesh Agent\MeshAgent.exe

        Filesize

        3.3MB

        MD5

        0375b9bc8048fff72a08872c0992ca2c

        SHA1

        0b8bf91a63cb2a814c14ff87f86957b7993c1ea8

        SHA256

        9902d605b851b3bb44d6d0fa6f1b9d46839a2e05836a661f7747d4ca27a6e000

        SHA512

        84f1443088d74f0983179fb6602644fd75ca8e62dbf29727b07a8d85d4ddbf939a43cd059728273d870237fc954c445686b66d47ff1c7f512aecb979c098b9a1

      • C:\Windows\Temp\__PSScriptPolicyTest_st4frfpc.z2i.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        4cc193c4523cb0a7b256df586b1b0e80

        SHA1

        e3cdb1acd17dc9a5d6c5b6e46c0e35cbc8a0dd23

        SHA256

        f2484e42e0b6573dd51560d2edbaedc97d7a10b260bf28edde0749b5ba5e37dd

        SHA512

        3a5f7d901b2ee1b25fd136dbfc33163d1940ff7f0c97ea5c318a5a8e014580837f224619512c4a089c6e5b376934a82da29b84ba3813a0f35d13cd814b326382

      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        1KB

        MD5

        0a30bb376829c23bdcc4a4d4d766898c

        SHA1

        07491abe08a0f8e4fb636556d53aa59d8634eeeb

        SHA256

        dfa0f1a5b6e2f296bfebda1d1f795a464ba50888bc49e6dcfe31276637a21160

        SHA512

        027c3180ef196b6bd44eb6e596ade49a3e319097a4c63a63b71ab8e0712e50250b3a6fb2bcc7c6c5ea07abc92d643ee321f77f66370a64b18255254fb148985c

      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        1KB

        MD5

        ab9b514d321d3356a8fe0de8e9a8b8bf

        SHA1

        edb604b84ba10b496c96ed1c14fa32981c05fb00

        SHA256

        bd8146579e0b87f8c3b99d4369ff8bed671399ade52d5a37f016c1ad55204187

        SHA512

        d0e67933b0e8010c938f7be852276e5c906a1f7fbdd6d1b33a6474c7d5ff25648a7046a725e64e0c0bf9d28b42548ee5a795f52667e3c875daf6811b6a20b530

      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        1KB

        MD5

        2e096d2498e3cc92e9db4a6e4cce09a9

        SHA1

        0236648420f3e244a5cae46fc9c57f3145bf067a

        SHA256

        897abf1c6aee42b0752b9d3e00fd51e7fe8348559f3602a942cf88add224ba1b

        SHA512

        7fd30fe7e9674444c11af65f03a3b195820dbe1c557f84247947955d4b62388a7dd03d04938fb1f50479fb7a9c49b6ea88caf2bfd38c569153c7bec7f42a3a04

      • memory/560-81-0x000001B177CB0000-0x000001B177CCC000-memory.dmp

        Filesize

        112KB

      • memory/560-82-0x000001B177CD0000-0x000001B177D83000-memory.dmp

        Filesize

        716KB

      • memory/560-83-0x000001B1777F0000-0x000001B1777FA000-memory.dmp

        Filesize

        40KB

      • memory/560-84-0x000001B177DB0000-0x000001B177DCC000-memory.dmp

        Filesize

        112KB

      • memory/560-85-0x000001B177D90000-0x000001B177D9A000-memory.dmp

        Filesize

        40KB

      • memory/560-86-0x000001B177DF0000-0x000001B177E0A000-memory.dmp

        Filesize

        104KB

      • memory/560-87-0x000001B177DA0000-0x000001B177DA8000-memory.dmp

        Filesize

        32KB

      • memory/560-88-0x000001B177DD0000-0x000001B177DD6000-memory.dmp

        Filesize

        24KB

      • memory/560-89-0x000001B177DE0000-0x000001B177DEA000-memory.dmp

        Filesize

        40KB

      • memory/5912-26-0x000002332B530000-0x000002332B552000-memory.dmp

        Filesize

        136KB

      • memory/5912-27-0x000002332B900000-0x000002332B946000-memory.dmp

        Filesize

        280KB