Resubmissions

17-06-2024 17:37

240617-v7lpssxfke 10

14-06-2024 20:15

240614-y1wg7sthng 10

Analysis

  • max time kernel
    292s
  • max time network
    265s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 17:37

General

  • Target

    TeraBox.exe

  • Size

    6.3MB

  • MD5

    7ab6073a5c400a5071bfa4ef2d936425

  • SHA1

    f794ea18eced4330979972da2a4bfa33c03afa2f

  • SHA256

    7774449e13c24d2b0b69114d9ba044e80dc8378fa3dfb5d17a142d5cb4cde8af

  • SHA512

    4371b6b49df43dab4abf90a71819276f30dca823c93335edd5513a67a646c97ef575b2ede650ceb2f0f168af13431254530e9bffc3db0f5b0eada1492c3cab73

  • SSDEEP

    98304:52XswubXaFliXVEaqz56LtbSeK78yYkVvkg7m8Etg1C9Y41WCpq:8XswuuKE7E4IDkVvkgK9fVWCo

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2620 /prefetch:2
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:4376
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=3384 /prefetch:8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1448
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3436
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2288
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"
      2⤵
        PID:1684
      • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
        -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4908.0.2082244419\1216792122 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.231" -PcGuid "TBIMXV2-O_D3B1F40972464F0E85C94F340659BA17-C_0-D_DD00013-M_CE876AE29DDA-V_3015B1F4" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        2⤵
          PID:2904
        • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
          "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4908.0.2082244419\1216792122 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.231" -PcGuid "TBIMXV2-O_D3B1F40972464F0E85C94F340659BA17-C_0-D_DD00013-M_CE876AE29DDA-V_3015B1F4" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3624
        • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
          "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1528
        • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
          "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.4908.1.611127240\220760293 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.231" -PcGuid "TBIMXV2-O_D3B1F40972464F0E85C94F340659BA17-C_0-D_DD00013-M_CE876AE29DDA-V_3015B1F4" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
          2⤵
            PID:1640
          • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe
            "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 30240 -unlogin
            2⤵
              PID:3540
            • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
              "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2612,17489296964137750593,10551776054082124328,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=4852 /prefetch:2
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2344

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Defense Evasion

          Subvert Trust Controls

          1
          T1553

          Install Root Certificate

          1
          T1553.004

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Download\AutoUpdate.xml
            Filesize

            24KB

            MD5

            c286cd40cd06c343b0a0daba4a8787ba

            SHA1

            971b13c25faff896033f77e0866fe21f7b26cbd5

            SHA256

            0af3d4862222a6b68993220e693c2501de14d6e922c3ecce1a60754462822c60

            SHA512

            e4ab1154ac2ece073d33277cf8d8394cec51100014589c6d997341d3553d19734b69cfc0ce9f3c87c55e34e833b7647c70a60e1972894762dba71914e38ac10b

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000055
            Filesize

            203KB

            MD5

            99916ce0720ed460e59d3fbd24d55be2

            SHA1

            d6bb9106eb65e3b84bfe03d872c931fb27f5a3db

            SHA256

            07118bf4bbc3ba87d75cbc11ddf427219a14d518436d7f3886d75301f897edaf

            SHA512

            8d3d52e57806d1850b57bffee12c1a8d9e1a1edcf871b2395df5c889991a183a8d652a0636d5452068f5ef78d37e08ce10b2b2f4e05c3e3c0f2f2230310418a8

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index
            Filesize

            48B

            MD5

            89689f3130c7f3d676c2423bb4fb5c34

            SHA1

            9f18d623d4a73e7cdae71c485e9e563668ac8d3e

            SHA256

            331f351526026dbb34ac86875b851a1064009f460d4e6bea9613c4145d7e0642

            SHA512

            b521c2f9141f4d4a3cfbaf9f8b6513dca979c5a4506a7ee9c061d649b8c19d453de6026923b548b09ec107805cf49031b40068fbb44bc3e5ec5d3193ea0d03bc

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index
            Filesize

            624B

            MD5

            d7228824bd0469e1cf2e79bd06684d98

            SHA1

            7ca267422fafb51dfe12a7efadd57f5d034ba595

            SHA256

            cea1919714f48af55176e0533bb52a60d60b35a8e26b60a755651e193ae98841

            SHA512

            356a6ff240b57cfa589087c1682fe18f46b370d48a03536ff20a71a8d4a509849ab6ad7d6a45d734f52ade0bbfd09872afd94192b999eea66902e8d615840e1d

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENT
            Filesize

            16B

            MD5

            46295cac801e5d4857d09837238a6394

            SHA1

            44e0fa1b517dbf802b18faf0785eeea6ac51594b

            SHA256

            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

            SHA512

            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State
            Filesize

            1KB

            MD5

            b46e63de814f8c4839b3cc3d2d1f4bfb

            SHA1

            b8de0bbe939e388c1bf573c7ebe72aa9bc8f1105

            SHA256

            64841e732acdae3808b52c691bb849a2110abcb62c5b785f05f69e963dba9da3

            SHA512

            5da57a414001d4240328589ef59ec31718bf043c4b03fb55a95fdc5d3bcd70f3e0b2163b629a090f4388ac6d80f9c89cffaa5e79f87bae03ef332b50f27f0a3e

          • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe58bd02.TMP
            Filesize

            59B

            MD5

            78bfcecb05ed1904edce3b60cb5c7e62

            SHA1

            bf77a7461de9d41d12aa88fba056ba758793d9ce

            SHA256

            c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

            SHA512

            2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

          • C:\Users\Admin\AppData\Local\Temp\TeraBox_status
            Filesize

            114B

            MD5

            d7f436db2546e176452ffc2f38bfdbee

            SHA1

            f97b670f8214032ec10dec11bfc573cad79cbcd6

            SHA256

            d43e796c7e31f48f72aae923e16df9d0cdc819a160e90d6fbbf28f0f8e3c9f58

            SHA512

            ce2fde94629be4d084fa250a1c44250c3d2d9f3152379cb9148140adc0016e44d07e133d77b4b0c1d45292faebe61e64b8bb4ec4fcda21ab6c058a456338c8e4

          • memory/3624-267-0x0000000000520000-0x0000000000521000-memory.dmp
            Filesize

            4KB

          • memory/3624-273-0x0000000002C20000-0x0000000002C21000-memory.dmp
            Filesize

            4KB

          • memory/3624-274-0x0000000064F50000-0x000000006637C000-memory.dmp
            Filesize

            20.2MB

          • memory/3624-268-0x0000000000800000-0x0000000000801000-memory.dmp
            Filesize

            4KB

          • memory/3624-269-0x0000000000810000-0x0000000000811000-memory.dmp
            Filesize

            4KB

          • memory/3624-270-0x0000000000820000-0x0000000000821000-memory.dmp
            Filesize

            4KB

          • memory/3624-271-0x00000000023E0000-0x00000000023E1000-memory.dmp
            Filesize

            4KB

          • memory/3624-272-0x00000000023F0000-0x00000000023F1000-memory.dmp
            Filesize

            4KB

          • memory/4908-5-0x00000000001AA000-0x00000000001AB000-memory.dmp
            Filesize

            4KB

          • memory/4908-335-0x00000000001A0000-0x0000000000801000-memory.dmp
            Filesize

            6.4MB

          • memory/4908-24-0x00000000001A0000-0x0000000000801000-memory.dmp
            Filesize

            6.4MB