Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 11:54

General

  • Target

    TeraBox_sl_b_1.31.0.1.exe

  • Size

    85.5MB

  • MD5

    79060976af019f7fb4cefbc0a4fe8ec4

  • SHA1

    907cf720fa0ddf346a44904b0b38654f3d562784

  • SHA256

    09e65a661e85c3a3ab0e848809e44f20332b9f46cf5da364c7c8d3992c957f85

  • SHA512

    a5decc422ed87f09786d3d42b3a26358faed6ca339ab3c4331b6b40c34fff62c48822a915aec71fce575fa03ccb1278e3bedb37072119b21309fb4d33828942b

  • SSDEEP

    1572864:D/Tbaxaxd3iMmFsW2sfWXx/Qux9f7yyZermJw0ZR09aoFXVqagAp0g9mTx:Tqaxi6x/hHf7yyZermJwSy9aoFwagA1y

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_sl_b_1.31.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox_sl_b_1.31.0.1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso4CFA.tmp\nsProcessW.dll
    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • \Users\Admin\AppData\Local\Temp\nso4CFA.tmp\NsisInstallUI.dll
    Filesize

    1.8MB

    MD5

    075abe6be6b717434cea2879a54c4714

    SHA1

    dc02581f578d22db7460352a476727ac5b2fcbb9

    SHA256

    5a5e5398424a4eab5ea1fb905313ea56a19b7210e0da44861503bbf3f9826c13

    SHA512

    90937b6aab2a4eeac74a33cf238131e011edc1b1f2bf9a9ce6dc5e0d21923330131ba5014e9ea1176ee88ee03d847cc69e6f1e91f7f68aa65c7a5ac4852f9d63

  • \Users\Admin\AppData\Local\Temp\nso4CFA.tmp\System.dll
    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • memory/2012-20-0x0000000002A60000-0x0000000002AA0000-memory.dmp
    Filesize

    256KB

  • memory/2012-129-0x0000000002A60000-0x0000000002AA0000-memory.dmp
    Filesize

    256KB