Analysis
-
max time kernel
311s -
max time network
326s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
TeraBox_1.13.1.5 (1).exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
TeraBox_1.13.1.5 (1).exe
Resource
win10v2004-20221111-en
General
-
Target
TeraBox_1.13.1.5 (1).exe
-
Size
80.8MB
-
MD5
403f3b034f8d216534f955688f468fab
-
SHA1
f41b643a2744a933fb18130fb3dd3d2b0051518b
-
SHA256
ded767690577af7c9513b14b6271c4d0f0309789b6dd2bcb2e47cb5aa017af53
-
SHA512
7e30de1033f105905d30b36468d06ec38761620c63695e5aeb58d3763b6c613229913258c10a708604cfd502d362d14d8e16c76ce29c6a4124ec7b426860b780
-
SSDEEP
1572864:WqUkKn6NpChkPSXgpUhBWXQi7/08StgJtctsuVSscPCrxn:hdFNAXXgqUF7jtXqv9F
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe 224 TeraBox_1.13.1.5 (1).exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5be1d5e6dad4d3856a8f91bf0d063a880
SHA17fb388fa6f6140161832be03d86046d905157004
SHA256be26f092d2bb7b5ce76df39287b79a51b356a5acfd5d69b56d718b9ded9105b8
SHA512fa56b75b93bfe261058960ed19476c138a653f4fb74edefd456c295c28539d78e6ad9402ab441a14728e9634ff1c8eb47d36278954509f9f10c6407d51565901
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7