Overview
overview
10Static
static
4Terabox_1.32.0.1.exe
windows7-x64
10Terabox_1.32.0.1.exe
windows10-2004-x64
4$PLUGINSDI...fg.ini
windows7-x64
1$PLUGINSDI...fg.ini
windows10-2004-x64
1$PLUGINSDI...fo.xml
windows7-x64
3$PLUGINSDI...fo.xml
windows10-2004-x64
1AppProperty.xml
windows7-x64
3AppProperty.xml
windows10-2004-x64
1AutoUpdate...fo.xml
windows7-x64
3AutoUpdate...fo.xml
windows10-2004-x64
1AutoUpdate/config.ini
windows7-x64
1AutoUpdate/config.ini
windows10-2004-x64
1CEF license.txt
windows7-x64
1CEF license.txt
windows10-2004-x64
1ChromeManifest.json
windows7-x64
3ChromeManifest.json
windows10-2004-x64
3DuiEngine license.txt
windows7-x64
1DuiEngine license.txt
windows10-2004-x64
1TeraBoxTor...le.ico
windows7-x64
3TeraBoxTor...le.ico
windows10-2004-x64
3VersionInfo
windows7-x64
1VersionInfo
windows10-2004-x64
1VersionInfo2
windows7-x64
1VersionInfo2
windows10-2004-x64
1autobackup.ico
windows7-x64
3autobackup.ico
windows10-2004-x64
3browserres/cef.pak
windows7-x64
3browserres/cef.pak
windows10-2004-x64
3browserres...nt.pak
windows7-x64
3browserres...nt.pak
windows10-2004-x64
3browserres...nt.pak
windows7-x64
3browserres...nt.pak
windows10-2004-x64
3Resubmissions
27-11-2024 20:39
241127-zfpdtszjes 627-11-2024 20:33
241127-zbwbksvqhl 625-11-2024 22:14
241125-15w1mswlcp 625-11-2024 20:57
241125-zryrmswke1 628-09-2024 18:21
240928-wzje5ssdlc 10Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 18:21
Behavioral task
behavioral1
Sample
Terabox_1.32.0.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Terabox_1.32.0.1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SetupCfg.ini
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SetupCfg.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/VersionInfo.xml
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/VersionInfo.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
AppProperty.xml
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AppProperty.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
AutoUpdate/VersionInfo.xml
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
AutoUpdate/VersionInfo.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
AutoUpdate/config.ini
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
AutoUpdate/config.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
CEF license.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CEF license.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ChromeManifest.json
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ChromeManifest.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
DuiEngine license.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
DuiEngine license.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
TeraBoxTorrentFile.ico
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
TeraBoxTorrentFile.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
VersionInfo
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
VersionInfo
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
VersionInfo2
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
VersionInfo2
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
autobackup.ico
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
autobackup.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
browserres/cef.pak
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
browserres/cef.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
browserres/cef_100_percent.pak
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
browserres/cef_100_percent.pak
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
browserres/cef_200_percent.pak
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
browserres/cef_200_percent.pak
Resource
win10v2004-20240802-en
General
-
Target
Terabox_1.32.0.1.exe
-
Size
85.5MB
-
MD5
b73657d85fe21f889cdbaf4f1724ff57
-
SHA1
c10e0f8cf0abda003931c5b27ce2416a076b0478
-
SHA256
9ed5767db68fb669b3f18a0565cae471ee3800b94a187c4512e5a6691797c511
-
SHA512
b013b7015e90043e2d8c021d9ea9a87505c36ffcb4619eb5fd06bd0e2c5742c3bc3fddc3a448112def652ab26d5372fee4a2d6f95c3c5ce09a000ffb7bf457f1
-
SSDEEP
1572864:yBumaBVNigHypMDTKWRhvRL7b3NWPVQ6kzjn:yBumaRigyp8TDRhvRD3APVr6jn
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Terabox_1.32.0.1.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe 1868 Terabox_1.32.0.1.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD569b36f5513e880105fe0994feef54e70
SHA157b689dbf36719e17a9f16ad5245c8605d59d4c0
SHA256531d1191eded0bf76abb40f0367efa2f4e4554123dc2373cf23ee3af983b6d5f
SHA512c5c09d81a601f8060acf6d9eeaa9e417843bb37b81d5de6b5c70fb404a529c2b906d4bb0995d574dd5a3b4986e3cbe20882aa3e8349e31ff26bdb832692596bd
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7