File name:

VPWSSetup_V2112.exe

Full analysis: https://app.any.run/tasks/3f5d97b0-6875-4097-9086-ead9bdd3abac
Verdict: Malicious activity
Analysis date: October 11, 2024, 00:39:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A3743560EAE9E40281062CD35E9306FD

SHA1:

B7D2FD287276C97E27291E899EF0181F6722D38B

SHA256:

11321A0A434E25B9C9B629DA15643E5C512FAEA244F42443310EDB472E6DEF6B

SSDEEP:

98304:qnm6Y824UhaslUJHz6F1yGOV1eoUE074sGmmhjlCzxsmr0fwcrbTcgSk6+QxtB8b:6ZtcNazSezpaLib8ue83DRAvd44zE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • Process drops legitimate windows executable

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • The process drops C-runtime libraries

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • Executable content was dropped or overwritten

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • Reads security settings of Internet Explorer

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • Checks Windows Trust Settings

      • VPWSSetup.exe (PID: 528)
    • Process requests binary or script from the Internet

      • VPWSSetup.exe (PID: 528)
  • INFO

    • Checks supported languages

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • Reads the computer name

      • VPWSSetup_V2112.exe (PID: 3844)
      • VPWSSetup.exe (PID: 528)
    • The process uses the downloaded file

      • VPWSSetup_V2112.exe (PID: 3844)
    • Process checks computer location settings

      • VPWSSetup_V2112.exe (PID: 3844)
    • Sends debugging messages

      • VPWSSetup.exe (PID: 528)
    • Create files in a temporary directory

      • VPWSSetup_V2112.exe (PID: 3844)
    • Creates files in the program directory

      • VPWSSetup.exe (PID: 528)
    • Checks proxy server information

      • VPWSSetup.exe (PID: 528)
    • Reads the software policy settings

      • VPWSSetup.exe (PID: 528)
    • Reads the machine GUID from the registry

      • VPWSSetup.exe (PID: 528)
    • Creates files or folders in the user directory

      • VPWSSetup.exe (PID: 528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:08:11 13:54:06+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 188928
InitializedDataSize: 102912
UninitializedDataSize: -
EntryPoint: 0x1cec9
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start vpwssetup_v2112.exe vpwssetup.exe sppextcomobj.exe no specs slui.exe no specs vpwssetup_v2112.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
528"C:\Users\admin\AppData\Local\Temp\RarSFX0\VPWSSetup.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\VPWSSetup.exe
VPWSSetup_V2112.exe
User:
admin
Company:
VP Inc.
Integrity Level:
HIGH
Description:
VPWalletSetup for payment
Version:
2.1.1.2
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\vpwssetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
884C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3844"C:\Users\admin\AppData\Local\Temp\VPWSSetup_V2112.exe" C:\Users\admin\AppData\Local\Temp\VPWSSetup_V2112.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\vpwssetup_v2112.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\version.dll
5004"C:\Users\admin\AppData\Local\Temp\VPWSSetup_V2112.exe" C:\Users\admin\AppData\Local\Temp\VPWSSetup_V2112.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\vpwssetup_v2112.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 500
Read events
2 496
Write events
4
Delete events
0

Modification events

(PID) Process:(3844) VPWSSetup_V2112.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:C%%Program Files (x86)%VP
Value:
C:\Users\admin\AppData\Local\Temp\RarSFX0
(PID) Process:(528) VPWSSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(528) VPWSSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(528) VPWSSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
92
Suspicious files
56
Text files
16
Unknown types
2

Dropped files

PID
Process
Filename
Type
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\VPWalletService.exeexecutable
MD5:98AC451A66A77D42B99224C64EBD7774
SHA256:0E23DC876AD3FCFED06724456527FA121212BD4CB126877C3A6406773706204A
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\VPWalletLauncherC.exeexecutable
MD5:5C91763F6E9E541A0A343E58FA0820D4
SHA256:15892F1F7EBA9DB72DE6EF6D2A9AFD9520BBBCF20631AA104B8202C6760E1ABF
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\freebl3.dllexecutable
MD5:F474DD91BB12F230209EC3163CE7E6C4
SHA256:F63B2CAB4B77AC63A1BECA66872A991E1F8233F2C513D42460DBF28C733B138C
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\LICENSEtext
MD5:17C0970E8C7B6A6BD33E0C66FE6DC514
SHA256:112F7B1A5C192DD892F2D2092DF46109185AD9F5EB729EAC9770F48C352887DF
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\VPWSSetup.exeexecutable
MD5:3B5F305A1CE21E4842063FA120ACFA35
SHA256:C6B0B07C5A56A6C8074819F2A16E284C844223042C11B2AC240609EEAC04C91E
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\COPYINGtext
MD5:BDDEDB773E17C5704ACA39EAC9F71FA4
SHA256:8D795AEAC957C8B6556B2ACA5E0A5A8B0B3254365D488BC62E280CB3255D441A
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\certutil.exeexecutable
MD5:F8DA06687FB47CA2C355C38CA2766262
SHA256:64AD18F4D9BEF01B86E39CA1E774DFA37DB46BC8267453C418DD7F723D6D014C
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\nspr4.dllexecutable
MD5:BD0E897DBC2DCC0CF1287FFD7C734CF0
SHA256:2D2096447B366D6640F2670EDB474AB208D8D85B5650DB5E80CC985D1189F911
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\nssdbm3.dllexecutable
MD5:8CC6A31974A175A65D6C090FEED39F42
SHA256:F64111FAA9966D7B7859C6467BEDBD64559284B049F55FFADC54DFC50A3A4264
3844VPWSSetup_V2112.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\bin\nss3.dllexecutable
MD5:54F3932864EED803BD1CB82DF43F0C76
SHA256:96E068E6162A98D212B57C86B14FC539F1BBDCCD363F68EFD8CDFECC90C699D3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
58
TCP/UDP connections
78
DNS requests
26
Threats
29

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
528
VPWSSetup.exe
GET
200
151.101.130.133:80
http://ocsp.globalsign.com/gsrsaovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBRrcGT%2BanRD3C1tW3nsrKeuXC7DPwQU%2BO9%2F8s14Z6jeb48kjYjxhwMCs%2BsCDDOdcVWyWqbeuaWiuA%3D%3D
unknown
whitelisted
528
VPWSSetup.exe
GET
200
151.101.194.133:80
http://ocsp2.globalsign.com/rootr3/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDQHuXyId%2FGI71DM6hVc%3D
unknown
whitelisted
528
VPWSSetup.exe
GET
14.0.113.100:80
http://www.vpay.co.kr/kvpfiles_new/KvpVcmd.dll.gz
unknown
whitelisted
528
VPWSSetup.exe
GET
14.0.113.100:80
http://www.vpay.co.kr/kvpfiles_new/KvpVcmd.dll.gz
unknown
whitelisted
1552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
528
VPWSSetup.exe
GET
14.0.113.100:80
http://www.vpay.co.kr/kvpfiles_new/ISP_crgen.dll.gz
unknown
whitelisted
528
VPWSSetup.exe
GET
200
14.0.113.100:80
http://www.vpay.co.kr/kvpfiles_new/ISP_INISafeNet.dll.gz
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4360
SearchApp.exe
184.86.251.22:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
528
VPWSSetup.exe
14.0.113.100:443
www.vpay.co.kr
CDNetworks
KR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
  • 20.44.239.154
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
www.bing.com
  • 184.86.251.22
  • 184.86.251.19
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.vpay.co.kr
  • 14.0.113.100
whitelisted
ocsp2.globalsign.com
  • 151.101.194.133
  • 151.101.130.133
  • 151.101.2.133
  • 151.101.66.133
whitelisted
ocsp.globalsign.com
  • 151.101.130.133
  • 151.101.2.133
  • 151.101.66.133
  • 151.101.194.133
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.76
  • 40.126.32.138
  • 40.126.32.72
  • 40.126.32.74
  • 40.126.32.68
  • 20.190.160.20
whitelisted

Threats

PID
Process
Class
Message
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
528
VPWSSetup.exe
Potentially Bad Traffic
ET INFO Compressed Executable SZDD Compress.exe Format Over HTTP
Process
Message
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Start
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1 Check for and remove existing files.., OK
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1 Check for and installation folder.., OK
VPWSSetup.exe
[VPWalletService] [6804] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [6804] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [6804] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [6804] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 3 Skip.., OK
VPWSSetup.exe
[VPWalletService] [6804] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 4 Install files.., OK