Overview
overview
6Static
static
4Terabox_1.32.0.1.exe
windows10-ltsc 2021-x64
6$PLUGINSDI...fg.ini
windows10-ltsc 2021-x64
1$PLUGINSDI...fo.xml
windows10-ltsc 2021-x64
3AppProperty.xml
windows10-ltsc 2021-x64
3AutoUpdate...fo.xml
windows10-ltsc 2021-x64
3AutoUpdate/config.ini
windows10-ltsc 2021-x64
1CEF license.txt
windows10-ltsc 2021-x64
1ChromeManifest.json
windows10-ltsc 2021-x64
3DuiEngine license.txt
windows10-ltsc 2021-x64
1TeraBoxTor...le.ico
windows10-ltsc 2021-x64
3VersionInfo
windows10-ltsc 2021-x64
1VersionInfo2
windows10-ltsc 2021-x64
1autobackup.ico
windows10-ltsc 2021-x64
3browserres/cef.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...ns.pak
windows10-ltsc 2021-x64
3browserres...es.pak
windows10-ltsc 2021-x64
3browserres...US.pak
windows10-ltsc 2021-x64
3browserres...CN.pak
windows10-ltsc 2021-x64
3cacert.pem
windows10-ltsc 2021-x64
3icudtl.dat
windows10-ltsc 2021-x64
3module/Ter...ist.db
windows10-ltsc 2021-x64
3resource.db
windows10-ltsc 2021-x64
3skin/skin.zip
windows10-ltsc 2021-x64
1snapshot_blob.bin
windows10-ltsc 2021-x64
3sounds/1.wav
windows10-ltsc 2021-x64
1sounds/2.wav
windows10-ltsc 2021-x64
1sounds/3.wav
windows10-ltsc 2021-x64
1sounds/4.wav
windows10-ltsc 2021-x64
1terabox_ex...me.zip
windows10-ltsc 2021-x64
1terabox_logo.ico
windows10-ltsc 2021-x64
3Resubmissions
27-11-2024 20:39
241127-zfpdtszjes 627-11-2024 20:33
241127-zbwbksvqhl 625-11-2024 22:14
241125-15w1mswlcp 625-11-2024 20:57
241125-zryrmswke1 628-09-2024 18:21
240928-wzje5ssdlc 10Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 22:14
Behavioral task
behavioral1
Sample
Terabox_1.32.0.1.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SetupCfg.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
AppProperty.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
AutoUpdate/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
AutoUpdate/config.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
CEF license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
ChromeManifest.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
DuiEngine license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
TeraBoxTorrentFile.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
VersionInfo
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
VersionInfo2
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
autobackup.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
browserres/cef.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
browserres/cef_100_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
browserres/cef_200_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
browserres/cef_extensions.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
browserres/devtools_resources.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
browserres/locales/en-US.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
browserres/locales/zh-CN.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
cacert.pem
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
icudtl.dat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
module/TeraBoxModuleList.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
resource.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
skin/skin.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
snapshot_blob.bin
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
sounds/1.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
sounds/2.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
sounds/3.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
sounds/4.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
terabox_ext_chrome.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
terabox_logo.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
$PLUGINSDIR/VersionInfo.xml
-
Size
90B
-
MD5
be7de86dd8caf740f5f2d748762fac4c
-
SHA1
b39726f6160ebd84f74ac977b2ac6a15643e84fe
-
SHA256
db29f712197b209c5118c680d1ed5e007eb24ca0a97d688fc895d3adaf423e48
-
SHA512
78c34cf38ee46a8a026a957f7720c2c1010f3885f807dbea00e28d3ea6e108283c1b84f6ba76885c868db41066ac5d90a4d62415f7f3524c2f74bbc0bdc59e28
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c3df2648e7c3f043973b48d78b3e0b4800000000020000000000106600000001000020000000d5368a2d20bc93e4b4f48fe2e4d06d2a8ef72c69f96a0ad089e1960dd7f26cb9000000000e80000000020000200000001c87a67bbd243270c83664fa511b3e93934e384978e14f1f793c2ea3b842b55620000000e834cb44fe7d9a51bef16a90207c801cbb542e822860377ba8e23edb56036c534000000039d9fef826f3f5f154d8013d4bb88d8bdfdae52bb726bad8ae146de32fba9b9059442752fd6010335c6702a0cc0d8414cf1047e2ca24c137654a50390276b71d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.4355\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3251727580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20719ec2873fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c3df2648e7c3f043973b48d78b3e0b48000000000200000000001066000000010000200000007b18dc1d01091296096599ec0d78b053161a6dbd67821c9a70fad727d972420a000000000e8000000002000020000000cca83001341e81b6c8b96ffe574037f96658037edf0e1a9c7a0a1f8cc91ee87f200000002bcd9046a775a9b3402908c5173ef8f10436f39d55ca2c6660f2a57dd8723b9a40000000e09c9cb845b9f8d30f81a4c292a70bab59d7c2ac2cfa79db1c16d15df6ded99cdb861a24bb4a66aa0b73c3f5a5865aa7b3b1cf10d979b6b888e802c42d04987b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439337968" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ED310A67-AB7A-11EF-93FE-C26F7221BFB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3256102567" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3251727580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102ca3c2873fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 228 iexplore.exe 228 iexplore.exe 4484 IEXPLORE.EXE 4484 IEXPLORE.EXE 4484 IEXPLORE.EXE 4484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3676 wrote to memory of 228 3676 MSOXMLED.EXE 80 PID 3676 wrote to memory of 228 3676 MSOXMLED.EXE 80 PID 228 wrote to memory of 4484 228 iexplore.exe 82 PID 228 wrote to memory of 4484 228 iexplore.exe 82 PID 228 wrote to memory of 4484 228 iexplore.exe 82
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\VersionInfo.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\VersionInfo.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:228 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a6dfcf513cd338ab2640f399e560ba31
SHA1cbc6ea36eef4c8e6e8524b2aa220b9c0017a9145
SHA256fac20d9c0f5375b23b8932cb8ecb0839245962b4b2cd91924cfc0d9206e4fabf
SHA5127b2dc6f8ac8fc1503caa508e8efb767a99448c35ab4714c46c034536b4b7b9067b2bf3170798130fe5a9d2763f38308aba868ca301791d0abf60e169d17acd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e0c1e74986d03bc2aa7f700138a1d4c0
SHA1e0a0ccd35297220c8b1aadcabfd463cab108973c
SHA256f00a76013885d3e0460e33f62c70d3d69fb3cbe9d019dcf66d9da4bb61e1988d
SHA512762697a9133a48d02acc50ad30b78be0f44c8e6787974558548609f0226c6549f4e6f53da5e3bceb7e4fb2cdc73e278c4fbda99eca1fbf88e06d61743e386769
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee