Overview
overview
6Static
static
4Terabox_1.32.0.1.exe
windows10-ltsc 2021-x64
6$PLUGINSDI...fg.ini
windows10-ltsc 2021-x64
1$PLUGINSDI...fo.xml
windows10-ltsc 2021-x64
3AppProperty.xml
windows10-ltsc 2021-x64
3AutoUpdate...fo.xml
windows10-ltsc 2021-x64
3AutoUpdate/config.ini
windows10-ltsc 2021-x64
1CEF license.txt
windows10-ltsc 2021-x64
1ChromeManifest.json
windows10-ltsc 2021-x64
3DuiEngine license.txt
windows10-ltsc 2021-x64
1TeraBoxTor...le.ico
windows10-ltsc 2021-x64
3VersionInfo
windows10-ltsc 2021-x64
1VersionInfo2
windows10-ltsc 2021-x64
1autobackup.ico
windows10-ltsc 2021-x64
3browserres/cef.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...ns.pak
windows10-ltsc 2021-x64
3browserres...es.pak
windows10-ltsc 2021-x64
3browserres...US.pak
windows10-ltsc 2021-x64
3browserres...CN.pak
windows10-ltsc 2021-x64
3cacert.pem
windows10-ltsc 2021-x64
3icudtl.dat
windows10-ltsc 2021-x64
3module/Ter...ist.db
windows10-ltsc 2021-x64
3resource.db
windows10-ltsc 2021-x64
3skin/skin.zip
windows10-ltsc 2021-x64
1snapshot_blob.bin
windows10-ltsc 2021-x64
3sounds/1.wav
windows10-ltsc 2021-x64
1sounds/2.wav
windows10-ltsc 2021-x64
1sounds/3.wav
windows10-ltsc 2021-x64
1sounds/4.wav
windows10-ltsc 2021-x64
1terabox_ex...me.zip
windows10-ltsc 2021-x64
1terabox_logo.ico
windows10-ltsc 2021-x64
3Resubmissions
27-11-2024 20:39
241127-zfpdtszjes 627-11-2024 20:33
241127-zbwbksvqhl 625-11-2024 22:14
241125-15w1mswlcp 625-11-2024 20:57
241125-zryrmswke1 628-09-2024 18:21
240928-wzje5ssdlc 10Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 22:14
Behavioral task
behavioral1
Sample
Terabox_1.32.0.1.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SetupCfg.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
AppProperty.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
AutoUpdate/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
AutoUpdate/config.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
CEF license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
ChromeManifest.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
DuiEngine license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
TeraBoxTorrentFile.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
VersionInfo
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
VersionInfo2
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
autobackup.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
browserres/cef.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
browserres/cef_100_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
browserres/cef_200_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
browserres/cef_extensions.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
browserres/devtools_resources.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
browserres/locales/en-US.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
browserres/locales/zh-CN.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
cacert.pem
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
icudtl.dat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
module/TeraBoxModuleList.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
resource.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
skin/skin.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
snapshot_blob.bin
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
sounds/1.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
sounds/2.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
sounds/3.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
sounds/4.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
terabox_ext_chrome.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
terabox_logo.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
AppProperty.xml
-
Size
50B
-
MD5
38a35ee4ef24896d4450825d30da2d84
-
SHA1
934a8104483de39185efae62e7b473380e32cfcc
-
SHA256
843a030382ce12299411cf34be5d9fb0dedf97775782386bde41e0f62b36b06a
-
SHA512
131089a9303458d5ba935eb39d6fad75e5f77cc210cef2eb4ca7b55cb457b00b60edd64ac629d72fdad9fc794125a664ed3865a563a1d90154b8d3f981e3f3bf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3379715519" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a5925e1af387674d896cbd662f92590a000000000200000000001066000000010000200000008542c450256f31407015a2e9796b8d0241b5bdd747ee3f5cc2dbc1ac6cea3126000000000e8000000002000020000000d723df7a25d4d94c16496908334c14b6b5a11fe180819a2cbc54d38d2ccfea4220000000735fa1fb956aa49a5555b2bd27f26ad4e763ae482e04614d96f9b16c30240fde400000004d49662ee0593b584eb36b0d1b5361f692ecbb415b2cbdc1a6e4a82a39284865c50d260ea49a887221276344b865a97c4d60eebb6b3397d0893f0b845c407ff0 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f25bca873fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145863" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439337981" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3379559379" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a5925e1af387674d896cbd662f92590a000000000200000000001066000000010000200000000c687b5183369591bf62cd9e34061c09af849a707f1fcfbd2b25ffc9be698b78000000000e8000000002000020000000c0ba1f746d63aa559b50af0ea445444801475179cf6c1e967212c3f7bba5a882200000002baa419db3935f1ea1e934eae18b251ad431744c809e28bf504da83b82e101f540000000aba4c110ed0be990916995532e07145c5366f50df517508b287fd557692ab363ade2639d240c0c86cebb51fae56c380a480b8a6847168899f28aeb8f3586dce2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3407215933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F415A1E1-AB7A-11EF-BD16-E6A5D50C5982} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3407215933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.4355\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00b50ca873fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 388 iexplore.exe 388 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2760 wrote to memory of 388 2760 MSOXMLED.EXE 79 PID 2760 wrote to memory of 388 2760 MSOXMLED.EXE 79 PID 388 wrote to memory of 1608 388 iexplore.exe 81 PID 388 wrote to memory of 1608 388 iexplore.exe 81 PID 388 wrote to memory of 1608 388 iexplore.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AppProperty.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\AppProperty.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a6dfcf513cd338ab2640f399e560ba31
SHA1cbc6ea36eef4c8e6e8524b2aa220b9c0017a9145
SHA256fac20d9c0f5375b23b8932cb8ecb0839245962b4b2cd91924cfc0d9206e4fabf
SHA5127b2dc6f8ac8fc1503caa508e8efb767a99448c35ab4714c46c034536b4b7b9067b2bf3170798130fe5a9d2763f38308aba868ca301791d0abf60e169d17acd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD53e4c4d9b9e0d55efb19fe70306199f88
SHA11eccfa88f439ec7076c9270734190dbe656ba792
SHA256c2abd52998c5fa9fe0afc5faa3a710a623788ec75d46ae8f578c3ed5f1423042
SHA51288c7cc057645b5abaf3601cc351d2ff4410877a4f6f082d814ecb4bd57e8304fde65f44ceeb6a6a378c368c94b00dc93af00b0685b43f9f00632a5fcd061d109
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee