Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-07-2024 23:39

General

  • Target

    TeraBox.exe

  • Size

    6.3MB

  • MD5

    7ab6073a5c400a5071bfa4ef2d936425

  • SHA1

    f794ea18eced4330979972da2a4bfa33c03afa2f

  • SHA256

    7774449e13c24d2b0b69114d9ba044e80dc8378fa3dfb5d17a142d5cb4cde8af

  • SHA512

    4371b6b49df43dab4abf90a71819276f30dca823c93335edd5513a67a646c97ef575b2ede650ceb2f0f168af13431254530e9bffc3db0f5b0eada1492c3cab73

  • SSDEEP

    98304:52XswubXaFliXVEaqz56LtbSeK78yYkVvkg7m8Etg1C9Y41WCpq:8XswuuKE7E4IDkVvkgK9fVWCo

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2608 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:3500
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2776 /prefetch:8
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4872
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3852
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4000
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3824
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.896.0.291219473\954105870 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.219" -PcGuid "TBIMXV2-O_7ED7CA07E75D4AD39E0D6F9659487E42-C_0-D_232138804165-M_DA223F025C74-V_D21BD574" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4468
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.896.0.291219473\954105870 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.219" -PcGuid "TBIMXV2-O_7ED7CA07E75D4AD39E0D6F9659487E42-C_0-D_232138804165-M_DA223F025C74-V_D21BD574" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1516
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:752
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.896.1.751871750\925323021 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.219" -PcGuid "TBIMXV2-O_7ED7CA07E75D4AD39E0D6F9659487E42-C_0-D_232138804165-M_DA223F025C74-V_D21BD574" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:544
    • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 70298 -unlogin
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2904
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2600,18195173854149297366,14790124880716406401,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=1124 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    24KB

    MD5

    04d397e124984b2733e542a78fec6381

    SHA1

    ffb405043e9a642d4dd4709b0b4ecd25a2527644

    SHA256

    e53ffe83942d03f6221d6c31d8dd48fe78979136c5e5e1a2996a9980606b8295

    SHA512

    9c6707554f43b1f98c9115445db3133885c32639d12a82f36f9ab0abcdcc6c564212f36eb264955a4ba96cd8814c3d29581fafbb6199c4dc12c8a9e8218f58dc

  • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Download\MainApp\upgrade_13101_13153.cab

    Filesize

    4.5MB

    MD5

    7a70b13ba9a7fecf2216616986563848

    SHA1

    f10f6cd99f54638717fb40b2efd014a165763c86

    SHA256

    cfec57466fc0e49ec1d51995208c0f9608bf74d6cf28124bf4860c71a17a1f52

    SHA512

    6f8d03d9bf1a086707818f1e4441fe285e6ae6523f5bb6cd3ee44d1b98df025178cabba2b353f328544967c7911e8ba1d7f8431c52f700b87190add9fc11f39b

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000056

    Filesize

    210KB

    MD5

    5ac828ee8e3812a5b225161caf6c61da

    SHA1

    86e65f22356c55c21147ce97903f5dbdf363649f

    SHA256

    b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7

    SHA512

    87472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    624B

    MD5

    58e8ec291b27594f537975091839fcdb

    SHA1

    d51140231f13b816a0f73d0b5e921448b08550e7

    SHA256

    583a10823f52cc120ff8d7cbad25c814c8c0b5ace6875197403415e70774163d

    SHA512

    d8a21c4b595c18c2001aa6185747fdc06f8bf572faaf246535febb3ba31315c6dc3013354623cf5281c9383d8a13720c3346f60003f875d6047ad272b63adf4f

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe586de8.TMP

    Filesize

    48B

    MD5

    3764c722ec6cd776d4660e64349859bb

    SHA1

    110189088c818ff15baa16fbfcb8ce659ddd929d

    SHA256

    bfe0644cd934410a56211017ed22efbbc89de3101bfe5e743f879cdab363c330

    SHA512

    aa5574ef0d46415fd3919c0cc9cfc6243ac481c6e9d059f723503cf9258155cf9425252720243dc5bc2a74272918825aa9c6fd40b19b026e85628e6c25c528ec

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State

    Filesize

    1KB

    MD5

    783e2b1cb2132edade4938eae1a6c715

    SHA1

    0085821a141b9946cb380b1a35ae66cdb0d3842f

    SHA256

    7808bd014a845e7210d39c17b666e4e1f106642c673d3646a86f9df8b6538b85

    SHA512

    3674e0ffbe207c203cd279546c7dee56ae13cd2987968a2e0ae5fb2f653a23fd4fd4045e1215555f77790d5f49a9976b4ec39476de71663355a1ada5b079c2c1

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe58d750.TMP

    Filesize

    59B

    MD5

    78bfcecb05ed1904edce3b60cb5c7e62

    SHA1

    bf77a7461de9d41d12aa88fba056ba758793d9ce

    SHA256

    c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

    SHA512

    2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_status

    Filesize

    114B

    MD5

    4cbaeba0e27ba515b16d191871114a15

    SHA1

    fc3c5c133565eea6c99013d8a36afc89b5c8400d

    SHA256

    f2c54a783fc87a37369a1d83170db7198c33b347f45555e74e5d0f4d623605ca

    SHA512

    ee1542ad648bc881cff27d8cd7f973b7a084a7d3fdb36cda510e608d8a679cb50bcc356a98404443c7a280a9219fe98272a0583098eb42aa9a9991b413b871c5

  • memory/896-339-0x0000000000270000-0x00000000008D1000-memory.dmp

    Filesize

    6.4MB

  • memory/896-24-0x0000000000270000-0x00000000008D1000-memory.dmp

    Filesize

    6.4MB

  • memory/896-5-0x000000000027A000-0x000000000027B000-memory.dmp

    Filesize

    4KB

  • memory/1516-273-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

    Filesize

    4KB

  • memory/1516-281-0x0000000065640000-0x0000000066A6C000-memory.dmp

    Filesize

    20.2MB

  • memory/1516-280-0x0000000002DB0000-0x0000000002DB1000-memory.dmp

    Filesize

    4KB

  • memory/1516-276-0x0000000002D90000-0x0000000002D91000-memory.dmp

    Filesize

    4KB

  • memory/1516-277-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

    Filesize

    4KB

  • memory/1516-272-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

    Filesize

    4KB

  • memory/1516-274-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/1516-275-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB