Overview
overview
10Static
static
4TeraBox_1.30.0.2.exe
windows7-x64
10TeraBox_1.30.0.2.exe
windows10-2004-x64
4$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
3$TEMP/kernel.dll
windows10-2004-x64
3AppUtil.dll
windows7-x64
3AppUtil.dll
windows10-2004-x64
3AutoUpdate...il.dll
windows7-x64
3AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
3AutoUpdate...te.exe
windows10-2004-x64
3BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
3Bull140U.dll
windows10-2004-x64
3ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
3HelpUtility.exe
windows7-x64
3HelpUtility.exe
windows10-2004-x64
3TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
5TeraBoxHost.exe
windows7-x64
3TeraBoxHost.exe
windows10-2004-x64
3TeraBoxRender.exe
windows7-x64
3TeraBoxRender.exe
windows10-2004-x64
3TeraBoxWebService.exe
windows7-x64
3TeraBoxWebService.exe
windows10-2004-x64
3Resubmissions
17-01-2025 13:15
250117-qhg8vsypcz 417-01-2025 11:29
250117-nlw53swmar 409-01-2025 21:28
250109-1bc1ns1qgt 405-01-2025 19:25
250105-x44gjstlew 10Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 19:25
Behavioral task
behavioral1
Sample
TeraBox_1.30.0.2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TeraBox_1.30.0.2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20241007-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
8ccf980ea54f3605d4360645416ad152
-
SHA1
99231ce34e0ff68dd417c2246a5ca71d147f96fe
-
SHA256
40a650cb5d37d6a5b3d8674f50ae3f6e243ac80f595f64d0b72f97854d5f20df
-
SHA512
644c51032536934bf1ebce9c93e97d201f18fffd21d31fb083853c7084c8fc63a35c02907bf91be0301805103a892c3f03164f5543daa976b22788b364be1a21
-
SSDEEP
49152:x7L6oPOReVwkTVcXj/SZTLvIkP4qghgZnfw58hG7UB:x7NQeZVcX7aIFqgiZfS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxRender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxWebService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeraBoxHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-940901362-3608833189-1915618603-1000\{BF15A232-9AE4-4DE3-9517-0DD6B73F09EF} TeraBoxRender.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2612 Autoupdate.exe 2612 Autoupdate.exe 5084 TeraBox.exe 5084 TeraBox.exe 5084 TeraBox.exe 5084 TeraBox.exe 4796 TeraBoxRender.exe 4796 TeraBoxRender.exe 4404 TeraBoxRender.exe 4404 TeraBoxRender.exe 3652 TeraBoxRender.exe 3652 TeraBoxRender.exe 760 TeraBoxRender.exe 760 TeraBoxRender.exe 1636 TeraBoxHost.exe 1636 TeraBoxHost.exe 1636 TeraBoxHost.exe 1636 TeraBoxHost.exe 1636 TeraBoxHost.exe 1636 TeraBoxHost.exe 3852 TeraBoxRender.exe 3852 TeraBoxRender.exe 2152 TeraBoxRender.exe 2152 TeraBoxRender.exe 2152 TeraBoxRender.exe 2152 TeraBoxRender.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2612 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 2612 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 2612 Autoupdate.exe Token: SeManageVolumePrivilege 1636 TeraBoxHost.exe Token: SeBackupPrivilege 1636 TeraBoxHost.exe Token: SeSecurityPrivilege 1636 TeraBoxHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5084 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5084 TeraBox.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4796 5084 TeraBox.exe 86 PID 5084 wrote to memory of 4796 5084 TeraBox.exe 86 PID 5084 wrote to memory of 4796 5084 TeraBox.exe 86 PID 5084 wrote to memory of 4404 5084 TeraBox.exe 87 PID 5084 wrote to memory of 4404 5084 TeraBox.exe 87 PID 5084 wrote to memory of 4404 5084 TeraBox.exe 87 PID 5084 wrote to memory of 760 5084 TeraBox.exe 88 PID 5084 wrote to memory of 760 5084 TeraBox.exe 88 PID 5084 wrote to memory of 760 5084 TeraBox.exe 88 PID 5084 wrote to memory of 3652 5084 TeraBox.exe 89 PID 5084 wrote to memory of 3652 5084 TeraBox.exe 89 PID 5084 wrote to memory of 3652 5084 TeraBox.exe 89 PID 5084 wrote to memory of 4496 5084 TeraBox.exe 91 PID 5084 wrote to memory of 4496 5084 TeraBox.exe 91 PID 5084 wrote to memory of 4496 5084 TeraBox.exe 91 PID 5084 wrote to memory of 2088 5084 TeraBox.exe 95 PID 5084 wrote to memory of 2088 5084 TeraBox.exe 95 PID 5084 wrote to memory of 2088 5084 TeraBox.exe 95 PID 5084 wrote to memory of 1636 5084 TeraBox.exe 98 PID 5084 wrote to memory of 1636 5084 TeraBox.exe 98 PID 5084 wrote to memory of 1636 5084 TeraBox.exe 98 PID 5084 wrote to memory of 3852 5084 TeraBox.exe 101 PID 5084 wrote to memory of 3852 5084 TeraBox.exe 101 PID 5084 wrote to memory of 3852 5084 TeraBox.exe 101 PID 5084 wrote to memory of 3480 5084 TeraBox.exe 102 PID 5084 wrote to memory of 3480 5084 TeraBox.exe 102 PID 5084 wrote to memory of 3480 5084 TeraBox.exe 102 PID 5084 wrote to memory of 2152 5084 TeraBox.exe 112 PID 5084 wrote to memory of 2152 5084 TeraBox.exe 112 PID 5084 wrote to memory of 2152 5084 TeraBox.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2484 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2820 /prefetch:83⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.5084.0.1876645907\434423860 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.118" -PcGuid "TBIMXV2-O_FFBE79251C304CAC9471F3D929DA61AC-C_0-D_232138804165-M_DEEFF298442C-V_F7772EDE" -Version "1.30.0.2" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.5084.0.1876645907\434423860 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.118" -PcGuid "TBIMXV2-O_FFBE79251C304CAC9471F3D929DA61AC-C_0-D_232138804165-M_DEEFF298442C-V_F7772EDE" -Version "1.30.0.2" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.5084.1.475019506\475945399 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.118" -PcGuid "TBIMXV2-O_FFBE79251C304CAC9471F3D929DA61AC-C_0-D_232138804165-M_DEEFF298442C-V_F7772EDE" -Version "1.30.0.2" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2480,13670565347325347351,1296855299573383489,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.30.0.2;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=5172 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5a74c6eb233e502284c2a2091796db710
SHA100e3ef9e7c91d238ffeb545e3cb5b0f819b6d9b2
SHA2567d695dbeea41f94dee9015c96ab7b6e64be9bab7c2598ac2c2836e86f93d6f51
SHA5120e6c17344b8417ed36ab70c97d88694ebbb4cb30d7d93bffae344fc93b8c3fe5272ff6f42f3c66924c887b076f793ce1533381d0b430f03f364582d3fab79fe6
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
600B
MD5de4ad212a50c45c9a84b31415cf6eb13
SHA17c83940089cc85e01671a548882e54a60cb6debb
SHA25680b8442b85f975580b7f1d62c0e51066f1334456318a4c69e4538b2c977f4ab3
SHA5120a5fc173c6d83b9dede9815b551e29c22d9d9e2230cbfaff6f1412ea64fcac0228b04b2b5a25ff89e1259db806baee903773d22cfbf46601e517f5377abba2b7
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe583bdb.TMP
Filesize48B
MD5b639b1b68fa0216733d5adbeec3fe6cc
SHA1743263ac475897d477d302651c14a8a4bd10ded9
SHA256ed53fe3c4cfac882917fb06eb40ed4f9f9b455960ef9ee6632e84f7934893019
SHA512c48f29fa67abb200f9e94674d330f3bbe2ff9fd1c06b9127087c1746eee0fcea9204fa082b1734e48a70393539cc8d315bf31609db58bfc1b1e40a6041212288
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD55d669db139ed29e296716dba468bb90b
SHA18545fbcaf3655ef94385691233c3ec45c058f6ae
SHA2568d8b823052291b0a98dd641660ba73f555f52af2d04b1cef94cd15ac5a584d92
SHA512727dd6c51fb8d7c6ea65b123544860debde73778fe4e3d1023d5889cbfe42116195ddd2bf62777f4b39a72491a3a0145d4d2bc52be8484fe82bc037b8a26701b
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b