Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 01:16

General

  • Target

    TurboVPN.exe

  • Size

    7.4MB

  • MD5

    781ae32e7d42865284b8a21e83e7fedd

  • SHA1

    7b51184832c98699cbf28af1979eadefbd706ea3

  • SHA256

    cb8f3977c6137d48557e530fd05887c23ab68e7a1aedec02166dae5fa8e00f45

  • SHA512

    f15b61720a01a32c8e23ce699b3cb2c2ec37880ad07a3010216ba741bbc6619235fef533f1f8522f1e18e040457ad6ccf3cc44cac249a4f4c70c91e697f42101

  • SSDEEP

    196608:zVkzJqWXi0tieKcwfopsQ8jGV8kqJdmUEuWAGInlCOE:z6qWXi0tieKcvOQ8s8/JAPKflCOE

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TurboVPN.exe
    "C:\Users\Admin\AppData\Local\Temp\TurboVPN.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\turboconfig.exe
      "C:\Users\Admin\AppData\Local\Temp\turboconfig.exe" C:\Users\Admin\AppData\Local\Temp /S
      2⤵
        PID:2872
      • C:\Users\Admin\AppData\Local\Temp\TurboVPN.exe
        "C:\Users\Admin\AppData\Local\Temp\TurboVPN.exe" /crash:2632 /crashcfg:"C:\Users\Admin\AppData\Local\turbovpn\tvdump\crashinfo_259496727_8592.dat" /rcname:
        2⤵
          PID:2396

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9caf8e5ecbbe0935f776cc5299c59978

        SHA1

        4045fcaa0703fccf71b75df8fbb02b4dd5078dac

        SHA256

        3ccf0cbe44898e485b225bdc712e44172360072b30f883eca61469aa172c1dbc

        SHA512

        39ec2794add215f939b933379da62da08f6992bc0d61cd290ed8d80ee861b4f7709cbb0604ead2307a3acc7d3dc98eebd01d0ea84a92469e29be9c03c0175975

      • C:\Users\Admin\AppData\Local\Temp\Cab5830.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar58DF.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\remote_config_data

        Filesize

        126KB

        MD5

        0cc07181684d59ee43bf89a320b39bad

        SHA1

        c0f5fcd6eae193a22295cc6f31e34409e710a002

        SHA256

        ae078bcfb63328ca9a65be93966d34d20847e7e6969026f272f8b4236f08ebe5

        SHA512

        686a84c1db52c4a5c44270000461724b735e049195cee0964ed6abf0f549fd1f87448aed78297962a16fd73168ae81be2ad2e64e387f95b65651ecb48828f60f

      • C:\Users\Admin\AppData\Local\turbovpn\tvdump\259496930_8595_vpn_win_ov_vpn_win_services.dmp

        Filesize

        195KB

        MD5

        3a76109501930f2f98b89396b6a9ba9d

        SHA1

        4a1acbf2a33623c0c573ad7bdb828ceca363978a

        SHA256

        cf58709312ada23caec00149e813da4421cb49534a8672d9ee773fd1b09b1dcb

        SHA512

        d955415f296180ccd28e64ecaa8fa1392572baad085342409399451730c3c6192218b2729f1000451bbd499715a38c8f3516c64ef42849f380a9fa20d63c542f

      • C:\Users\Admin\AppData\Local\turbovpn\tvdump\crashinfo_259496727_8592.dat

        Filesize

        1KB

        MD5

        2a8ee7bff82e10b3362182379e1f2c80

        SHA1

        7a8efbfa185261257905acd436336a6190702655

        SHA256

        d43cedf5e9487fec5d53361392f0d9e85de4acb8bde81f8c977d9494aa56e19f

        SHA512

        e511569d6a9dc12db59712a3d7281a93fc68ca1233e36ae4f4d820f1390e32b01e91e3c290436732fef28235fea04b0f8075173eadb9f5b788e52e784cd16997

      • C:\Users\Admin\AppData\Local\turbovpn\tvdump\crashinfo_259496727_8592.dat

        Filesize

        2KB

        MD5

        d34a99e544ca28706b879f8ccfd6b009

        SHA1

        374573b7ad6880c292734db293ffa12ce0739ad3

        SHA256

        79e7aa2f82c5165e2cac5ffa7ed6c260b60f8923667bab72da335f326f1eaedc

        SHA512

        56449629b0c4840c83ef9782b745c7edc2d328861ab411e24c55da404a1d400d9d1c0502a542f84b0de8417d895ca406d23b4d316d5bce0f7ae6f70cadccb34c

      • memory/2632-0-0x00000000034E0000-0x00000000034E1000-memory.dmp

        Filesize

        4KB