Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 03:21
Behavioral task
behavioral1
Sample
GENERATE_SEASON.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GENERATE_SEASON.exe
Resource
win10v2004-20241007-en
General
-
Target
GENERATE_SEASON.exe
-
Size
3.2MB
-
MD5
e7d072887645cbf0597dc6c8f682a4ce
-
SHA1
f44c400e706f8d201a5e393a441cf29f08247326
-
SHA256
36581f3e196c43eadec9987659e53639bb90f28f4ddac5640bce04de093ccfeb
-
SHA512
da11629a4546d33944c25991127c5db0acd6673fee92ff918c1e71317a6ec9eb85fefea2f50f10a7960aacc7533a38d42e6c2d0b330911c54dc4790d33f21468
-
SSDEEP
49152:avelL26AaNeWgPhlmVqvMQ7XSKWzc2WobvJ/9oGdN1zTHHB72eh2NTZ6u:avOL26AaNeWgPhlmVqkQ7XSKPo3/
Malware Config
Extracted
quasar
1.4.1
Orbx Downloader
xeidaniyeu-37344.portmap.host:37344
61861806-59ce-4798-82be-a1b654aa1c9e
-
encryption_key
B87A6DBC29140772F82018FBEECE64D863C053A2
-
install_name
Orbx Downloader.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
update
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1608-1-0x0000000000F00000-0x000000000122E000-memory.dmp family_quasar behavioral2/files/0x0008000000023c85-5.dat family_quasar -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Orbx Downloader.exe -
Executes dropped EXE 2 IoCs
pid Process 2052 Orbx Downloader.exe 2952 501Uw0BmymaV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 3432 taskkill.exe 4268 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe 2356 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1608 GENERATE_SEASON.exe Token: SeDebugPrivilege 2052 Orbx Downloader.exe Token: SeDebugPrivilege 3432 taskkill.exe Token: SeDebugPrivilege 4268 taskkill.exe Token: 33 1636 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1636 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2052 Orbx Downloader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4376 1608 GENERATE_SEASON.exe 85 PID 1608 wrote to memory of 4376 1608 GENERATE_SEASON.exe 85 PID 1608 wrote to memory of 2052 1608 GENERATE_SEASON.exe 87 PID 1608 wrote to memory of 2052 1608 GENERATE_SEASON.exe 87 PID 2052 wrote to memory of 2356 2052 Orbx Downloader.exe 88 PID 2052 wrote to memory of 2356 2052 Orbx Downloader.exe 88 PID 2052 wrote to memory of 2952 2052 Orbx Downloader.exe 107 PID 2052 wrote to memory of 2952 2052 Orbx Downloader.exe 107 PID 2952 wrote to memory of 3432 2952 501Uw0BmymaV.exe 108 PID 2952 wrote to memory of 3432 2952 501Uw0BmymaV.exe 108 PID 2952 wrote to memory of 4268 2952 501Uw0BmymaV.exe 110 PID 2952 wrote to memory of 4268 2952 501Uw0BmymaV.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GENERATE_SEASON.exe"C:\Users\Admin\AppData\Local\Temp\GENERATE_SEASON.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Orbx Downloader.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4376
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Orbx Downloader.exe"C:\Users\Admin\AppData\Roaming\SubDir\Orbx Downloader.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Orbx Downloader.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\501Uw0BmymaV.exe"C:\Users\Admin\AppData\Local\Temp\501Uw0BmymaV.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x490 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b6d61b516d41e209b207b41d91e3b90d
SHA1e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA2563d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA5123217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da
-
Filesize
3.2MB
MD5e7d072887645cbf0597dc6c8f682a4ce
SHA1f44c400e706f8d201a5e393a441cf29f08247326
SHA25636581f3e196c43eadec9987659e53639bb90f28f4ddac5640bce04de093ccfeb
SHA512da11629a4546d33944c25991127c5db0acd6673fee92ff918c1e71317a6ec9eb85fefea2f50f10a7960aacc7533a38d42e6c2d0b330911c54dc4790d33f21468