Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27-11-2024 20:33

General

  • Target

    TeraBox.exe

  • Size

    6.3MB

  • MD5

    117c541f80c5e6706e722f9431d9fef6

  • SHA1

    d19eb357c221f4802e0c342da69bcdd463400b80

  • SHA256

    e6435157581258557202d04b08ebda3c87d52e5354ccc33825d80673c6b16e30

  • SHA512

    8239044b8b08d5743d09118c5db1a0e5dac8b77482b8d9b6146130df397d4a1b00427b6049bc82f14e6f6cf67a5dc8cdc3387931e28544277fe4fd9c912c0328

  • SSDEEP

    98304:bADvoVCPjkvi5FIQlaFR/Hi+u1QdaTyJqypAVx+lJy8ygx:8DvovjTaeJ3KGl08X

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2468,4120477783532274284,4680651396290614708,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2472 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:4048
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2468,4120477783532274284,4680651396290614708,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2768 /prefetch:8
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2660
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2468,4120477783532274284,4680651396290614708,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4628
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2468,4120477783532274284,4680651396290614708,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3976
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3656.0.1579947063\1601318001 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.10" -PcGuid "TBIMXV2-O_1143C2F7CE054901A35C8BDE84EEB444-C_0-D_232138804165-M_EE5BA24529FD-V_63082F06" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4256
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3656.0.1579947063\1601318001 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.10" -PcGuid "TBIMXV2-O_1143C2F7CE054901A35C8BDE84EEB444-C_0-D_232138804165-M_EE5BA24529FD-V_63082F06" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4924
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2468,4120477783532274284,4680651396290614708,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2308
    • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
      "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.3656.1.1003675497\1251663958 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.10" -PcGuid "TBIMXV2-O_1143C2F7CE054901A35C8BDE84EEB444-C_0-D_232138804165-M_EE5BA24529FD-V_63082F06" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4700
    • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 501f0 -unlogin
      2⤵
      • System Location Discovery: System Language Discovery
      PID:664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    21KB

    MD5

    742b0f22be7780fbf4623afd7f54845d

    SHA1

    f68e3da90c24d41007b9c922c3eba4867dbfd52f

    SHA256

    3c53d406e5c109299a01ced00cacd6bb4e95527a8569d5256ec946151d5427ae

    SHA512

    738fad21a69c2dbe9c45bd254630a177082cf0343b1f8324b8a702bbb90ea13937cf8c9a0bda13827ea615b7a2a25cf894e362e9cd89aa7cb2e5e08518e4cb78

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000018

    Filesize

    215KB

    MD5

    2be38925751dc3580e84c3af3a87f98d

    SHA1

    8a390d24e6588bef5da1d3db713784c11ca58921

    SHA256

    1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

    SHA512

    1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    624B

    MD5

    785512dea9f645d7f667d248fb339549

    SHA1

    674888d426fef9ed042d215fd94a10967fb6c42d

    SHA256

    75ca78813dc45cd1c25b9960910ca208455df9cbba8c4549e7060bea2e37a6b9

    SHA512

    f1c96df9f6ec77e0d3568c9758aa394cf3d113b7aeec179829dc246b9b402a4135defccb03c83aca696941f223a405e0d1ae0b356c06b076de6d539181547d17

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe5811ce.TMP

    Filesize

    48B

    MD5

    c57a093def9884913dc07c383cccf674

    SHA1

    f045cf3c41e273ab35e1ef79af14e5095ae69535

    SHA256

    1bcc191ebb30b6bd9fe33c3ffc64f0d97a684f320248a053ba8ff1a452914202

    SHA512

    a7c294124fbc129dbf63efa79fdff080ba67137262a0a2864a12f08be0bc8cdf7382e2da9b1cc8ed8683638427b5a18890fd35f46752fd1158b5325e3e873e25

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Local Storage\leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State

    Filesize

    1KB

    MD5

    0897b038c77e5d344f69e453de480854

    SHA1

    0ddf0359ad1e6cd7f1688bb290aab52a990867e9

    SHA256

    a924339c4768a7fb500a5c6bbe9e45b049877934ef72e7c144e31254c6181c9c

    SHA512

    57d690a2a6a9492099ed2eb4e8a51b69324aa2ac995dca004f5c45d238d2c0270cd8097cb4959fda1d631f9231037895fa1555785f1c6babdf4d92e7e46eb983

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe58ba04.TMP

    Filesize

    59B

    MD5

    78bfcecb05ed1904edce3b60cb5c7e62

    SHA1

    bf77a7461de9d41d12aa88fba056ba758793d9ce

    SHA256

    c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

    SHA512

    2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_status

    Filesize

    113B

    MD5

    62539bf21a34fe62a732950a97d9537d

    SHA1

    9fb36ea63056fde2af09e78f862e886bfca1da3b

    SHA256

    7b9de30ab2dd3bd137dc4d979577c6a5ad6c599100f5f708116da3692ba2dcc2

    SHA512

    9a9d49f46a7424ed85d711781394f2792653cab365865eee16b3e7425ec254c563ba433363b15575e05ec9affd1b04764fe37bdddc5732ea1666f0755ed0a0d9

  • memory/3656-5-0x0000000076821000-0x0000000076822000-memory.dmp

    Filesize

    4KB

  • memory/3656-141-0x0000000076800000-0x00000000768F0000-memory.dmp

    Filesize

    960KB

  • memory/3656-207-0x0000000076800000-0x00000000768F0000-memory.dmp

    Filesize

    960KB

  • memory/3656-23-0x0000000076800000-0x00000000768F0000-memory.dmp

    Filesize

    960KB

  • memory/3656-6-0x0000000076800000-0x00000000768F0000-memory.dmp

    Filesize

    960KB

  • memory/4924-155-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/4924-161-0x0000000064B00000-0x0000000065F2C000-memory.dmp

    Filesize

    20.2MB

  • memory/4924-160-0x0000000002C90000-0x0000000002C91000-memory.dmp

    Filesize

    4KB

  • memory/4924-156-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/4924-158-0x0000000002B60000-0x0000000002B61000-memory.dmp

    Filesize

    4KB

  • memory/4924-159-0x0000000002B70000-0x0000000002B71000-memory.dmp

    Filesize

    4KB

  • memory/4924-157-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

    Filesize

    4KB

  • memory/4924-154-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB