Overview
overview
6Static
static
4Terabox_1.32.0.1.exe
windows7-x64
6Terabox_1.32.0.1.exe
windows10-2004-x64
4$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
3$TEMP/kernel.dll
windows10-2004-x64
3AppUtil.dll
windows7-x64
3AppUtil.dll
windows10-2004-x64
3AutoUpdate...il.dll
windows7-x64
3AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
3AutoUpdate...te.exe
windows10-2004-x64
3BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
3Bull140U.dll
windows10-2004-x64
3ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
3HelpUtility.exe
windows7-x64
3HelpUtility.exe
windows10-2004-x64
3TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
5TeraBoxHost.exe
windows7-x64
3TeraBoxHost.exe
windows10-2004-x64
3TeraBoxRender.exe
windows7-x64
3TeraBoxRender.exe
windows10-2004-x64
3TeraBoxWebService.exe
windows7-x64
3TeraBoxWebService.exe
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 16:10
Behavioral task
behavioral1
Sample
Terabox_1.32.0.1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Terabox_1.32.0.1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20240802-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
eec7155c48e1715f5d4eb489b01b717e
-
SHA1
6e054c9389e20930779e3a3e33250813d4f1115e
-
SHA256
8b0d7c1ab782922b44e283f958697dd2e3b427b8a6def2efabac3dd380b0fe9f
-
SHA512
c7c57bf484d90fcaf9b32fd35d435cbac5c64575dbc099f26d069ef8904c0c865bf0b4b72fcbbde335c701f07a9974bd7df8444879caf9fe230e05fe33c9a88e
-
SSDEEP
49152:Y7L6oPOReVwkTVcXj/SZTLvIkP4qghnX+fw58hG7UBg:Y7NQeZVcX7aIFqgJXMS3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxWebService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{D4D3D726-667F-44C9-B208-14CADD160FD4} TeraBoxRender.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3200 Autoupdate.exe 3200 Autoupdate.exe 3272 TeraBox.exe 3272 TeraBox.exe 3272 TeraBox.exe 3272 TeraBox.exe 3188 TeraBoxRender.exe 3188 TeraBoxRender.exe 3056 TeraBoxRender.exe 3056 TeraBoxRender.exe 2364 TeraBoxRender.exe 2364 TeraBoxRender.exe 2516 TeraBoxRender.exe 2516 TeraBoxRender.exe 3508 TeraBoxHost.exe 3508 TeraBoxHost.exe 3508 TeraBoxHost.exe 3508 TeraBoxHost.exe 1616 TeraBoxRender.exe 1616 TeraBoxRender.exe 3508 TeraBoxHost.exe 3508 TeraBoxHost.exe 628 TeraBoxRender.exe 628 TeraBoxRender.exe 628 TeraBoxRender.exe 628 TeraBoxRender.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3200 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 3200 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 3200 Autoupdate.exe Token: SeManageVolumePrivilege 3508 TeraBoxHost.exe Token: SeBackupPrivilege 3508 TeraBoxHost.exe Token: SeSecurityPrivilege 3508 TeraBoxHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3272 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3272 TeraBox.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3188 3272 TeraBox.exe 83 PID 3272 wrote to memory of 3188 3272 TeraBox.exe 83 PID 3272 wrote to memory of 3188 3272 TeraBox.exe 83 PID 3272 wrote to memory of 3056 3272 TeraBox.exe 84 PID 3272 wrote to memory of 3056 3272 TeraBox.exe 84 PID 3272 wrote to memory of 3056 3272 TeraBox.exe 84 PID 3272 wrote to memory of 2516 3272 TeraBox.exe 85 PID 3272 wrote to memory of 2516 3272 TeraBox.exe 85 PID 3272 wrote to memory of 2516 3272 TeraBox.exe 85 PID 3272 wrote to memory of 2364 3272 TeraBox.exe 86 PID 3272 wrote to memory of 2364 3272 TeraBox.exe 86 PID 3272 wrote to memory of 2364 3272 TeraBox.exe 86 PID 3272 wrote to memory of 4624 3272 TeraBox.exe 87 PID 3272 wrote to memory of 4624 3272 TeraBox.exe 87 PID 3272 wrote to memory of 4624 3272 TeraBox.exe 87 PID 3272 wrote to memory of 3156 3272 TeraBox.exe 92 PID 3272 wrote to memory of 3156 3272 TeraBox.exe 92 PID 3272 wrote to memory of 3156 3272 TeraBox.exe 92 PID 3272 wrote to memory of 3508 3272 TeraBox.exe 93 PID 3272 wrote to memory of 3508 3272 TeraBox.exe 93 PID 3272 wrote to memory of 3508 3272 TeraBox.exe 93 PID 3272 wrote to memory of 1616 3272 TeraBox.exe 95 PID 3272 wrote to memory of 1616 3272 TeraBox.exe 95 PID 3272 wrote to memory of 1616 3272 TeraBox.exe 95 PID 3272 wrote to memory of 2760 3272 TeraBox.exe 96 PID 3272 wrote to memory of 2760 3272 TeraBox.exe 96 PID 3272 wrote to memory of 2760 3272 TeraBox.exe 96 PID 3272 wrote to memory of 628 3272 TeraBox.exe 101 PID 3272 wrote to memory of 628 3272 TeraBox.exe 101 PID 3272 wrote to memory of 628 3272 TeraBox.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2600 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2936 /prefetch:83⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3272.0.1576619930\981536255 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.57" -PcGuid "TBIMXV2-O_09B46F8BA8A74D8BAEBB26DAD4884104-C_0-D_232138804165-M_EE6C637598CE-V_FBC5781E" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3272.0.1576619930\981536255 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.57" -PcGuid "TBIMXV2-O_09B46F8BA8A74D8BAEBB26DAD4884104-C_0-D_232138804165-M_EE6C637598CE-V_FBC5781E" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.3272.1.1553171574\1681608123 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.57" -PcGuid "TBIMXV2-O_09B46F8BA8A74D8BAEBB26DAD4884104-C_0-D_232138804165-M_EE6C637598CE-V_FBC5781E" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2596,1888863238658244510,4391287543232569580,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=4020 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5ce7f93fa9f5b43072976f051081ceebc
SHA1a92fa05a2b3f6b8f06104567a8abc4dae7391e71
SHA256f777ff6b0c75c0fec421548126582607223a10cd44f79ddcb0cdee969ff77b6c
SHA512c4c81482bb51f6618a24347ca3ec64c77328376e5d994e6c79747d96192da24a77447b0900f26e4aa7af65fb487a5585e2821e6cbc789f34fa9d800518e01607
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
624B
MD5469e5e85265a0b1d0a39562b8ef13b0c
SHA185f2598e9fdf08e2c65b6df8b4b009af9195cced
SHA256efe618c1f7fc848f2c91439cfee2140b40de991c4cd42f6fbfa2f30fba1a1db9
SHA5126bd557ac3c8eccf5e0e29cde5037b1437c42f72845f05204b277413e27b2de297b01b51c8b42c4bb5201d270d134c5b1747032d0d70d4a6e6a20a9cd1cd2f190
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe57fadb.TMP
Filesize48B
MD5dc127dde417232c8e57413b402e9f068
SHA1d7960ec321c4ef06233c1c804a13718731a8d0a9
SHA2562928ea29508a6666b9038687be6a23ef3e49272156ae9138938bb9ef6294922b
SHA512a6b7821cad4d558c546c50878fb0f1e4805951c302f2e84c905e0fe14f033321d742f470049e814c02b98b3e0e27445cc388606066a490826a33bcaf7d1d0a99
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5aec1024004e50ad49cf1c991806c5aec
SHA12ba66fa2318c99579863f729dc4ba0479e417ba6
SHA256280ec156392c83c8e50c947e0637c19d8774966d36bdaca9efce62bd2680c2e3
SHA512304601696166846cbd54dfe7f6e9a0108de3671f8ddd55c0569a094cd461f90c2608c8a7fb022f51303ed5275f929f335093d21e6adf84251d91193435ac651e
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b