Overview
overview
10Static
static
4TeraBox_sl....1.exe
windows7-x64
10TeraBox_sl....1.exe
windows10-2004-x64
4$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
3$TEMP/kernel.dll
windows10-2004-x64
3AppUtil.dll
windows7-x64
3AppUtil.dll
windows10-2004-x64
3AutoUpdate...il.dll
windows7-x64
3AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
3AutoUpdate...te.exe
windows10-2004-x64
3BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
3Bull140U.dll
windows10-2004-x64
3ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
3HelpUtility.exe
windows7-x64
3HelpUtility.exe
windows10-2004-x64
3TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
5TeraBoxHost.exe
windows7-x64
3TeraBoxHost.exe
windows10-2004-x64
3TeraBoxRender.exe
windows7-x64
3TeraBoxRender.exe
windows10-2004-x64
3TeraBoxWebService.exe
windows7-x64
3TeraBoxWebService.exe
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 23:39
Behavioral task
behavioral1
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20240730-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
94c5b0443f1c39b71b22931509bf1985
-
SHA1
35cb27275187b8c0da72d00b8551aaf2c1059794
-
SHA256
7260c2623c4277b045d97e87a677d41bbfd11647109a4d648c311310889cebfb
-
SHA512
a08a897095239f367c51b36724f54aa961420e07f76185075902efd7ee023eb8f0a6c8b49769158fbf9372377028182515995b0ac0b7277e12a2640a3e6a3721
-
SSDEEP
49152:57L6oPOReVwkTVcXj/SZTLvIkP4qgh7Xufw58hG7UB:57NQeZVcX7aIFqgtX8S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxWebService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3774859476-2260090144-3466365324-1000\{1B8EA922-58A4-489E-8E91-E66D7E907005} TeraBoxRender.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4504 Autoupdate.exe 4504 Autoupdate.exe 2264 TeraBox.exe 2264 TeraBox.exe 2264 TeraBox.exe 2264 TeraBox.exe 316 TeraBoxRender.exe 316 TeraBoxRender.exe 4944 TeraBoxRender.exe 4944 TeraBoxRender.exe 2568 TeraBoxRender.exe 2568 TeraBoxRender.exe 3740 TeraBoxRender.exe 3740 TeraBoxRender.exe 1720 TeraBoxHost.exe 1720 TeraBoxHost.exe 1720 TeraBoxHost.exe 1720 TeraBoxHost.exe 4556 TeraBoxRender.exe 4556 TeraBoxRender.exe 1720 TeraBoxHost.exe 1720 TeraBoxHost.exe 4208 TeraBoxRender.exe 4208 TeraBoxRender.exe 4208 TeraBoxRender.exe 4208 TeraBoxRender.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4504 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 4504 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 4504 Autoupdate.exe Token: SeManageVolumePrivilege 1720 TeraBoxHost.exe Token: SeBackupPrivilege 1720 TeraBoxHost.exe Token: SeSecurityPrivilege 1720 TeraBoxHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2264 TeraBox.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2264 wrote to memory of 316 2264 TeraBox.exe 84 PID 2264 wrote to memory of 316 2264 TeraBox.exe 84 PID 2264 wrote to memory of 316 2264 TeraBox.exe 84 PID 2264 wrote to memory of 4944 2264 TeraBox.exe 85 PID 2264 wrote to memory of 4944 2264 TeraBox.exe 85 PID 2264 wrote to memory of 4944 2264 TeraBox.exe 85 PID 2264 wrote to memory of 3740 2264 TeraBox.exe 87 PID 2264 wrote to memory of 3740 2264 TeraBox.exe 87 PID 2264 wrote to memory of 3740 2264 TeraBox.exe 87 PID 2264 wrote to memory of 2568 2264 TeraBox.exe 88 PID 2264 wrote to memory of 2568 2264 TeraBox.exe 88 PID 2264 wrote to memory of 2568 2264 TeraBox.exe 88 PID 2264 wrote to memory of 4932 2264 TeraBox.exe 86 PID 2264 wrote to memory of 4932 2264 TeraBox.exe 86 PID 2264 wrote to memory of 4932 2264 TeraBox.exe 86 PID 2264 wrote to memory of 5104 2264 TeraBox.exe 90 PID 2264 wrote to memory of 5104 2264 TeraBox.exe 90 PID 2264 wrote to memory of 5104 2264 TeraBox.exe 90 PID 2264 wrote to memory of 1720 2264 TeraBox.exe 91 PID 2264 wrote to memory of 1720 2264 TeraBox.exe 91 PID 2264 wrote to memory of 1720 2264 TeraBox.exe 91 PID 2264 wrote to memory of 4556 2264 TeraBox.exe 92 PID 2264 wrote to memory of 4556 2264 TeraBox.exe 92 PID 2264 wrote to memory of 4556 2264 TeraBox.exe 92 PID 2264 wrote to memory of 3100 2264 TeraBox.exe 93 PID 2264 wrote to memory of 3100 2264 TeraBox.exe 93 PID 2264 wrote to memory of 3100 2264 TeraBox.exe 93 PID 2264 wrote to memory of 4208 2264 TeraBox.exe 95 PID 2264 wrote to memory of 4208 2264 TeraBox.exe 95 PID 2264 wrote to memory of 4208 2264 TeraBox.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2580 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=3008 /prefetch:83⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.2264.0.2026248290\1943161460 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.102" -PcGuid "TBIMXV2-O_EC566F4EF72948C0B5BCA6F58C09C2C3-C_0-D_232138804165-M_5667AFC8C18C-V_1A81B1D0" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.2264.0.2026248290\1943161460 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.102" -PcGuid "TBIMXV2-O_EC566F4EF72948C0B5BCA6F58C09C2C3-C_0-D_232138804165-M_5667AFC8C18C-V_1A81B1D0" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.2264.1.667332344\979861144 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.102" -PcGuid "TBIMXV2-O_EC566F4EF72948C0B5BCA6F58C09C2C3-C_0-D_232138804165-M_5667AFC8C18C-V_1A81B1D0" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2572,7020166235917449754,2080087450109060328,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=4636 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5da5a68982b9237673715d25826d333f6
SHA14a590521322ba4bbb0d5200f6f8e4949e5391608
SHA256e8066cabca060375dbb3ae316ff4db2471441c5d4db86089dbbf2e7bf6c627db
SHA512221710a4726faa0acbfec3c2f8af78cb8ad721edc758ed56c1dd95d36f78348b45b40719b857841ab9b7d01f27db1a2e311e15a94be9ddb31fabf44658fcdb11
-
Filesize
1KB
MD53f989feef28e33b74abad7458a83bcc4
SHA12022bca9de0c395bc3fdbe58d1631294b7977012
SHA256e9e3c9f0d324de69620d0680451d5a08b1d645e57df967376620d725274817f6
SHA51218f938547006594e266fe018caa7441c14215a8b96cf95f6cfd32c44a52bcf5a713024bcc1802807a76b03589e509dd21ce43138296db91ed3c6042387a775ec
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
624B
MD576fa9db38c37cc4caed15a245970f541
SHA1a555dd9d36f374a9206492a89b8c71d11164ec2c
SHA256fafeda18a0adeb22cf6e8158586c8ccdcb73c5b83e11d1bc6dbaef20646c856d
SHA512280487b686e085ce79c6a2472b83e8f26bef89063ea90c2e00576db8df8f49c2baf8b7a5b01818ed48ad76bd4838885721ab8a1d9a9b2e5596f9f69553672f4a
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe586a2f.TMP
Filesize48B
MD53b253f85bb3a06160062900d1d7dcc30
SHA1670aafe6a34e7c0b40fa5e77455837e306b0d9fd
SHA2564ed64b23af6ab624080fb89243ce1cdecd534d25dd7730a3c8c1a5ea1af414d7
SHA51261082676c0893b3d0953ea02e0d0620e692fc7a0471828414fc262159d4b3ee8fa3ce2f0c7a8ab59680a095ab5193347b8c2ab77985d03fdbdc1ead20f95b9b7
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73