Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe
-
Size
2.2MB
-
MD5
e19f2d8b706b8ae8390bcb5ee7b10d1f
-
SHA1
d1bf74445805bb2b9744aaf272e70166fe07bbfd
-
SHA256
c3ff697ffa3ccf61ac56655f9334a66645a1fb86274ea16ecf43b797a753e567
-
SHA512
6d74c88abc84eb7390a7c8245e8d5f4a361e293e07b49ff2b08021e5f864319faf6a1b886d628cb861d27baab9560a67521a9baa5f68e50f592663ead0ee8c68
-
SSDEEP
49152:BwN7fzYcFe7I3TEK24Y9/qTjtfdI7dHiCgqAmcP1Qy8rPGZfEvYENf/rHi1y:4YcFe8gT/qfJM9i8KuxKyp/rHis
Malware Config
Extracted
quasar
1.3.0.0
Test1
192.168.100.7:4782
192.168.100.1:4782
192.168.100.2:4782
192.168.100.3:4782
192.168.100.4:4782
192.168.100.5:4782
192.168.100.6:4782
192.168.100.8:4782
192.168.100.9:4782
QSR_MUTEX_EUcqtx8KrCdmvD2YIx
-
encryption_key
riVWKQv6KwgHqOuBNiok
-
install_name
Microsoft.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Microsoft.exe family_quasar behavioral2/memory/3224-15-0x0000000000A10000-0x0000000000A7C000-memory.dmp family_quasar -
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Microsoft.exe INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3224-15-0x0000000000A10000-0x0000000000A7C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables containing common artifacts observed in infostealers 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Microsoft.exe INDICATOR_SUSPICIOUS_GENInfoStealer behavioral2/memory/3224-15-0x0000000000A10000-0x0000000000A7C000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe -
Executes dropped EXE 2 IoCs
Processes:
Microsoft.exeMicrosoft.exepid process 3224 Microsoft.exe 1172 Microsoft.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Microsoft.exeMicrosoft.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.exe\"" Microsoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "\"C:\\Windows\\SysWOW64\\SubDir\\Microsoft.exe\"" Microsoft.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ip-api.com -
Drops file in System32 directory 4 IoCs
Processes:
Microsoft.exeMicrosoft.exedescription ioc process File created C:\Windows\SysWOW64\SubDir\Microsoft.exe Microsoft.exe File opened for modification C:\Windows\SysWOW64\SubDir\Microsoft.exe Microsoft.exe File opened for modification C:\Windows\SysWOW64\SubDir\Microsoft.exe Microsoft.exe File opened for modification C:\Windows\SysWOW64\SubDir Microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3564 schtasks.exe 1076 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Microsoft.exeMicrosoft.exedescription pid process Token: SeDebugPrivilege 3224 Microsoft.exe Token: SeDebugPrivilege 1172 Microsoft.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Microsoft.exepid process 1172 Microsoft.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exeMicrosoft.exeMicrosoft.exedescription pid process target process PID 3088 wrote to memory of 3224 3088 2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe Microsoft.exe PID 3088 wrote to memory of 3224 3088 2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe Microsoft.exe PID 3088 wrote to memory of 3224 3088 2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe Microsoft.exe PID 3224 wrote to memory of 3564 3224 Microsoft.exe schtasks.exe PID 3224 wrote to memory of 3564 3224 Microsoft.exe schtasks.exe PID 3224 wrote to memory of 3564 3224 Microsoft.exe schtasks.exe PID 3224 wrote to memory of 1172 3224 Microsoft.exe Microsoft.exe PID 3224 wrote to memory of 1172 3224 Microsoft.exe Microsoft.exe PID 3224 wrote to memory of 1172 3224 Microsoft.exe Microsoft.exe PID 1172 wrote to memory of 1076 1172 Microsoft.exe schtasks.exe PID 1172 wrote to memory of 1076 1172 Microsoft.exe schtasks.exe PID 1172 wrote to memory of 1076 1172 Microsoft.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-06_e19f2d8b706b8ae8390bcb5ee7b10d1f_cova_ryuk.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3564 -
C:\Windows\SysWOW64\SubDir\Microsoft.exe"C:\Windows\SysWOW64\SubDir\Microsoft.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Microsoft.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD5e170049e9b196df27c1f126e1c694f7e
SHA1b4f82cca3a3430ff49eaacb4a4c15a360d3068f3
SHA2561edd92518733782c94389dcc05c00457ef027717f31300d9d678179896f49540
SHA512a83a5ece0bc0f6cc376b7fbd8f4c8c3b0911f807e52f3b0484acf02267cb680dbe93ff22a06ca5f7a86b8ed996bee8648013ce92082ce27b2d1658048df38512