Overview
overview
6Static
static
4Terabox_1.32.0.1.exe
windows10-ltsc 2021-x64
6$PLUGINSDI...fg.ini
windows10-ltsc 2021-x64
1$PLUGINSDI...fo.xml
windows10-ltsc 2021-x64
3AppProperty.xml
windows10-ltsc 2021-x64
3AutoUpdate...fo.xml
windows10-ltsc 2021-x64
3AutoUpdate/config.ini
windows10-ltsc 2021-x64
1CEF license.txt
windows10-ltsc 2021-x64
1ChromeManifest.json
windows10-ltsc 2021-x64
3DuiEngine license.txt
windows10-ltsc 2021-x64
1TeraBoxTor...le.ico
windows10-ltsc 2021-x64
3VersionInfo
windows10-ltsc 2021-x64
1VersionInfo2
windows10-ltsc 2021-x64
1autobackup.ico
windows10-ltsc 2021-x64
3browserres/cef.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...nt.pak
windows10-ltsc 2021-x64
3browserres...ns.pak
windows10-ltsc 2021-x64
3browserres...es.pak
windows10-ltsc 2021-x64
3browserres...US.pak
windows10-ltsc 2021-x64
3browserres...CN.pak
windows10-ltsc 2021-x64
3cacert.pem
windows10-ltsc 2021-x64
3icudtl.dat
windows10-ltsc 2021-x64
3module/Ter...ist.db
windows10-ltsc 2021-x64
3resource.db
windows10-ltsc 2021-x64
3skin/skin.zip
windows10-ltsc 2021-x64
1snapshot_blob.bin
windows10-ltsc 2021-x64
3sounds/1.wav
windows10-ltsc 2021-x64
1sounds/2.wav
windows10-ltsc 2021-x64
1sounds/3.wav
windows10-ltsc 2021-x64
1sounds/4.wav
windows10-ltsc 2021-x64
1terabox_ex...me.zip
windows10-ltsc 2021-x64
1terabox_logo.ico
windows10-ltsc 2021-x64
3Resubmissions
27-11-2024 20:39
241127-zfpdtszjes 627-11-2024 20:33
241127-zbwbksvqhl 625-11-2024 22:14
241125-15w1mswlcp 625-11-2024 20:57
241125-zryrmswke1 628-09-2024 18:21
240928-wzje5ssdlc 10Analysis
-
max time kernel
90s -
max time network
126s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 22:14
Behavioral task
behavioral1
Sample
Terabox_1.32.0.1.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SetupCfg.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
AppProperty.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
AutoUpdate/VersionInfo.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
AutoUpdate/config.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
CEF license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
ChromeManifest.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
DuiEngine license.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
TeraBoxTorrentFile.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
VersionInfo
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
VersionInfo2
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
autobackup.ico
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
browserres/cef.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
browserres/cef_100_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
browserres/cef_200_percent.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
browserres/cef_extensions.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
browserres/devtools_resources.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
browserres/locales/en-US.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
browserres/locales/zh-CN.pak
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
cacert.pem
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
icudtl.dat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
module/TeraBoxModuleList.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
resource.db
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
skin/skin.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
snapshot_blob.bin
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
sounds/1.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
sounds/2.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
sounds/3.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
sounds/4.wav
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
terabox_ext_chrome.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
terabox_logo.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
AutoUpdate/VersionInfo.xml
-
Size
91B
-
MD5
ce123e07fb4922d383b316509fc42b0a
-
SHA1
f14430f14931c28dc0603426664029380053b92c
-
SHA256
41be369f328416e229a7f9bda1b9cadd2ee39392aacc6c33c1442559a738b4ef
-
SHA512
71d2f37e8719e9ae15fc2604b5cccfe03034e2fc747740485f2640d5280a643ae97a1066150485f572ed7018323cbdb6ed3c72d70677e33f5fc711e6518833dc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00063ad0873fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104b35d0873fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3501907826" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3518626838" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439337992" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FADD6388-AB7A-11EF-8586-5E372CCB3B2C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.4355\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086aedb7a94ec4a46a2f58148deaaaa5c0000000002000000000010660000000100002000000014f60e28625b052b36252caae50dd558956f29eee7b155fb5b6798e6ae69842f000000000e8000000002000020000000aa6f37c4c2346b5b31d4d869a95141bcfe984184a95824032eabd847d26a2bca2000000044139772ea7ad657e2b47220a63df9b541c77127482bf34a741c4f65f9c90937400000009313790e36abe00369840748c0e03335c9c4e1964293d5e7c713c9f6faac71cd4c04dfb495e4b20728f6338b8bcca41b0dd3296a319faa0f081bb964780ad2ab iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3501907826" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3518626838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145863" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086aedb7a94ec4a46a2f58148deaaaa5c000000000200000000001066000000010000200000001bac474755c6a4caa2d1cc76a20b7df34fda2f0a6d173dc082d2ebb2308246e8000000000e80000000020000200000009d0153cd9d314e5d9748016af02c9e1b1b6eabecb5f07f1d64d50f81831e62f02000000021429d17b86906a5c76a07b2cb50f32fb197b8c50d2ca3e6528d02c8c5fcd4ee4000000044f59415edb655cfbf1507640767e269c3139bf013224773a4dc57cf51def279881d699262f5de2ba655fac2fde4f03cc5edf2f47cea5c2c5a39d0c39e1d8caa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145863" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3732 iexplore.exe 3732 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3168 wrote to memory of 3732 3168 MSOXMLED.EXE 79 PID 3168 wrote to memory of 3732 3168 MSOXMLED.EXE 79 PID 3732 wrote to memory of 2836 3732 iexplore.exe 81 PID 3732 wrote to memory of 2836 3732 iexplore.exe 81 PID 3732 wrote to memory of 2836 3732 iexplore.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\VersionInfo.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\AutoUpdate\VersionInfo.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3732 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a6dfcf513cd338ab2640f399e560ba31
SHA1cbc6ea36eef4c8e6e8524b2aa220b9c0017a9145
SHA256fac20d9c0f5375b23b8932cb8ecb0839245962b4b2cd91924cfc0d9206e4fabf
SHA5127b2dc6f8ac8fc1503caa508e8efb767a99448c35ab4714c46c034536b4b7b9067b2bf3170798130fe5a9d2763f38308aba868ca301791d0abf60e169d17acd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD56357e0f611600c104e8e235772ef63c5
SHA17418a428787554f3d8ae8a86bb8fb95776df467e
SHA25667da2de9374affa9461f3a2baa4253946b98ea0583e9b74338d528dd983414e5
SHA5127ffa89d2ea0d7ce70201465770bfd79a93eed93048ff641e90e621a299db007174a5eb0d2eb216c8ea2e835e69d8000c5ae5eb526cd75fbeae286650a08c552f
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee