Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    112s
  • max time network
    119s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    25-11-2024 20:57

General

  • Target

    TeraBox.exe

  • Size

    6.3MB

  • MD5

    117c541f80c5e6706e722f9431d9fef6

  • SHA1

    d19eb357c221f4802e0c342da69bcdd463400b80

  • SHA256

    e6435157581258557202d04b08ebda3c87d52e5354ccc33825d80673c6b16e30

  • SHA512

    8239044b8b08d5743d09118c5db1a0e5dac8b77482b8d9b6146130df397d4a1b00427b6049bc82f14e6f6cf67a5dc8cdc3387931e28544277fe4fd9c912c0328

  • SSDEEP

    98304:bADvoVCPjkvi5FIQlaFR/Hi+u1QdaTyJqypAVx+lJy8ygx:8DvovjTaeJ3KGl08X

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2588,7651507293266194815,1178375593605519821,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2600 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:3856
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2588,7651507293266194815,1178375593605519821,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2932 /prefetch:8
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2664
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2588,7651507293266194815,1178375593605519821,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:996
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2588,7651507293266194815,1178375593605519821,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1692
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1120
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4200.0.2031549701\617938920 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.237" -PcGuid "TBIMXV2-O_B0BDAE3FD1644CF79C4B5FD9EE4C8F8C-C_0-D_232138804165-M_4A33A36AC2B6-V_1B8841C3" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4236
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2588,7651507293266194815,1178375593605519821,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1780
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4200.0.2031549701\617938920 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.237" -PcGuid "TBIMXV2-O_B0BDAE3FD1644CF79C4B5FD9EE4C8F8C-C_0-D_232138804165-M_4A33A36AC2B6-V_1B8841C3" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.4200.1.201670893\1184745519 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.237" -PcGuid "TBIMXV2-O_B0BDAE3FD1644CF79C4B5FD9EE4C8F8C-C_0-D_232138804165-M_4A33A36AC2B6-V_1B8841C3" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2724
    • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 6024c -unlogin
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    21KB

    MD5

    742b0f22be7780fbf4623afd7f54845d

    SHA1

    f68e3da90c24d41007b9c922c3eba4867dbfd52f

    SHA256

    3c53d406e5c109299a01ced00cacd6bb4e95527a8569d5256ec946151d5427ae

    SHA512

    738fad21a69c2dbe9c45bd254630a177082cf0343b1f8324b8a702bbb90ea13937cf8c9a0bda13827ea615b7a2a25cf894e362e9cd89aa7cb2e5e08518e4cb78

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000017

    Filesize

    215KB

    MD5

    2be38925751dc3580e84c3af3a87f98d

    SHA1

    8a390d24e6588bef5da1d3db713784c11ca58921

    SHA256

    1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

    SHA512

    1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    624B

    MD5

    6bdeeb269eb03ac86d26e70f92c8ac0d

    SHA1

    20bd7c39bcef698159c6dc7021253dfb6b1c3829

    SHA256

    c3f759ccd5a40719b762e572977103aa8f0f8822d031d554a162bfd5f42c1164

    SHA512

    248945a04dd88bf26a867f48be102f14cde6c315f2e9d381945e742d471d8454122ebf439d4f1d9c1a961d1c7692f1e685f289ec245c2525ed4a9724eb9d9ac0

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe585e96.TMP

    Filesize

    48B

    MD5

    61d1240baff077282d2834f0436cfaa0

    SHA1

    ad327e82ac05847f357fc2dccac0b5de7158eb8f

    SHA256

    21bdbbd871c4e16aa5da20b107609492f9d55939df7093ca8d6605483eb6002c

    SHA512

    b3121e6121b78a69d5b874cb6a69e6a0d7b9450efd2837aa97af233dc45934f7c293ee5724a4e590346e5b50b8e2142fe99f12c7c7f192e16ff6f6383ebd8216

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Local Storage\leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State

    Filesize

    1KB

    MD5

    9792effb8f953e3efc079314a5d3170b

    SHA1

    43206bd955d12ede0e41d05a7582b93713ad85fb

    SHA256

    c8dcdf6175748c42e946507251a14d793fc656ac8fbbf7b9a3a333faedeb1ad5

    SHA512

    967bae8cb8f4256e3fab713cd2556641e3f1b08dc0e59b844a11095c3b1751c7f3d9de9137b8fbe1a523a2fb8ff92168f892d48be08fe09f18c90c5dfe77fa8f

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe591081.TMP

    Filesize

    59B

    MD5

    2800881c775077e1c4b6e06bf4676de4

    SHA1

    2873631068c8b3b9495638c865915be822442c8b

    SHA256

    226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

    SHA512

    e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_status

    Filesize

    114B

    MD5

    0194650fb9e5f1eb2d4d37eb9bd287cb

    SHA1

    140fbf6abb276366ce35e0d2a94576e9b3232cf3

    SHA256

    00c5a1001bf51a4176ce8277e6cd829e2070350567378023f10b7d3f374a1e56

    SHA512

    df28b9c6c81c0d883ab134ad292eb03a3b49b3a98b473bed2c7072ac9146cb1c36bfe6114f41fd1b9df87ab48806c8984e5487f745f4293142ef99305269eae0

  • memory/1124-184-0x0000000065270000-0x000000006669C000-memory.dmp

    Filesize

    20.2MB

  • memory/1124-180-0x0000000002890000-0x0000000002891000-memory.dmp

    Filesize

    4KB

  • memory/1124-179-0x0000000002880000-0x0000000002881000-memory.dmp

    Filesize

    4KB

  • memory/1124-182-0x0000000002F30000-0x0000000002F31000-memory.dmp

    Filesize

    4KB

  • memory/1124-181-0x0000000002F10000-0x0000000002F11000-memory.dmp

    Filesize

    4KB

  • memory/1124-183-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/1124-178-0x0000000000D10000-0x0000000000D11000-memory.dmp

    Filesize

    4KB

  • memory/1124-177-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/4200-6-0x0000000076C80000-0x0000000076D70000-memory.dmp

    Filesize

    960KB

  • memory/4200-176-0x0000000076C80000-0x0000000076D70000-memory.dmp

    Filesize

    960KB

  • memory/4200-124-0x0000000076C80000-0x0000000076D70000-memory.dmp

    Filesize

    960KB

  • memory/4200-23-0x0000000076C80000-0x0000000076D70000-memory.dmp

    Filesize

    960KB

  • memory/4200-5-0x0000000076CA1000-0x0000000076CA2000-memory.dmp

    Filesize

    4KB