analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ResWorkVPN_1.2.1.exe

Full analysis: https://app.any.run/tasks/3c79a3cd-8984-45c3-9d00-432908a0dd7b
Verdict: Malicious activity
Analysis date: November 17, 2019, 01:41:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

93CEAEFE32CCAA3623CC0C093759DE39

SHA1:

61D353BB1C0E2BD87A96B72292CD540685DA4B1E

SHA256:

3BCA98C07EF27C5A9939897527FC3A2D313B071258E2208ED986AFF19B132781

SSDEEP:

49152:6mikkfM0X+eChdolxRve1+CUq2ktBBLdsW5bCHwE53BS9Uh+jLAXvyurfB1Lf4iz:6mbEM8+5kwPs0eu9UYjLuvD+0OG7t

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ResWorkVPN_1.2.1.exe (PID: 2760)
      • openvpn.exe (PID: 3324)
    • Writes to a start menu file

      • msiexec.exe (PID: 3452)
    • Application was dropped or rewritten from another process

      • tapinstall.exe (PID: 2520)
      • tapinstall.exe (PID: 2336)
      • ResWorkVPN.exe (PID: 1940)
      • ResWorkVPN.exe (PID: 2200)
      • openvpn.exe (PID: 3324)
    • Loads the Task Scheduler DLL interface

      • ResWorkVPN_1.2.1.exe (PID: 2760)
    • Changes settings of System certificates

      • ResWorkVPN.exe (PID: 1940)
  • SUSPICIOUS

    • Creates files in the user directory

      • ResWorkVPN_1.2.1.exe (PID: 2760)
      • MsiExec.exe (PID: 2988)
    • Executable content was dropped or overwritten

      • ResWorkVPN_1.2.1.exe (PID: 2760)
      • msiexec.exe (PID: 3452)
      • tapinstall.exe (PID: 2520)
      • DrvInst.exe (PID: 2336)
      • ResWorkVPN_1.2.1.exe (PID: 3468)
      • DrvInst.exe (PID: 1880)
    • Application launched itself

      • ResWorkVPN_1.2.1.exe (PID: 2760)
    • Uses RUNDLL32.EXE to load library

      • MsiExec.exe (PID: 2988)
      • DrvInst.exe (PID: 2336)
    • Starts CMD.EXE for commands execution

      • MSICBED.tmp (PID: 3012)
      • ResWorkVPN.exe (PID: 1940)
    • Executed via COM

      • DrvInst.exe (PID: 2336)
      • DrvInst.exe (PID: 1880)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2336)
      • DrvInst.exe (PID: 1880)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2336)
      • DrvInst.exe (PID: 1880)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 2336)
      • DrvInst.exe (PID: 1880)
    • Executed as Windows Service

      • vssvc.exe (PID: 3748)
    • Creates files in the program directory

      • ResWorkVPN_1.2.1.exe (PID: 3468)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2056)
    • Adds / modifies Windows certificates

      • ResWorkVPN.exe (PID: 1940)
  • INFO

    • Application launched itself

      • msiexec.exe (PID: 3452)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2988)
      • MsiExec.exe (PID: 3008)
    • Creates files in the program directory

      • msiexec.exe (PID: 3452)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 3452)
    • Application was dropped or rewritten from another process

      • MSICBED.tmp (PID: 3012)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3452)
    • Searches for installed software

      • DrvInst.exe (PID: 2336)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:11:29 13:34:32+01:00
PEType: PE32
LinkerVersion: 14.11
CodeSize: 1152000
InitializedDataSize: 527872
UninitializedDataSize: -
EntryPoint: 0xd0d69
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.2.1.0
ProductVersionNumber: 1.2.1.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Spanish (Modern)
CharacterSet: Unicode
CompanyName: ResWorkVPN
FileDescription: Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
FileVersion: 1.2.1
InternalName: ResWorkVPNInstaladorInstalador
LegalCopyright: Copyright (C) 2019 ResWorkVPN
OriginalFileName: ResWorkVPNInstalador.exeInstalador
ProductName: ResWorkVPNInstalador
ProductVersion: 1.2.1

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Nov-2017 12:34:32
Detected languages:
  • English - United States
  • Spanish - Spain (International sort)
Debug artifacts:
  • C:\Branch\win\Release\stubs\x86\ExternalUi.pdb
CompanyName: ResWorkVPN
FileDescription: Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
FileVersion: 1.2.1
InternalName: ResWorkVPNInstaladorInstalador
LegalCopyright: Copyright (C) 2019 ResWorkVPN
OriginalFileName: ResWorkVPNInstalador.exeInstalador
ProductName: ResWorkVPNInstalador
ProductVersion: 1.2.1

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Nov-2017 12:34:32
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00119314
0x00119400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.64226
.rdata
0x0011B000
0x000543E8
0x00054400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.58461
.data
0x00170000
0x00007154
0x00002400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.19572
.rsrc
0x00178000
0x000159D4
0x00015A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.34124
.reloc
0x0018E000
0x00014AC0
0x00014C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.58253

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.221
1915
Latin 1 / Western European
Spanish - Spain (International sort)
RT_MANIFEST
2
3.1591
9640
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
3
3.46873
4264
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
4
3.54157
2440
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
5
4.01317
1128
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
9
3.31635
1318
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
10
3.31258
2148
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
11
3.27233
734
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
12
3.19114
1476
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
13
3.32064
896
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING

Imports

KERNEL32.dll
msi.dll (delay-loaded)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
19
Malicious processes
7
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start resworkvpn_1.2.1.exe msiexec.exe msiexec.exe rundll32.exe no specs resworkvpn_1.2.1.exe msiexec.exe no specs msicbed.tmp no specs cmd.exe no specs tapinstall.exe no specs tapinstall.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe resworkvpn.exe no specs resworkvpn.exe cmd.exe no specs taskkill.exe no specs openvpn.exe

Process information

PID
CMD
Path
Indicators
Parent process
2760"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe
explorer.exe
User:
admin
Company:
ResWorkVPN
Integrity Level:
MEDIUM
Description:
Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
Exit code:
0
Version:
1.2.1
3452C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2988C:\Windows\system32\MsiExec.exe -Embedding F5AA15A463A029C1F2DDA72746855759 CC:\Windows\system32\MsiExec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3488rundll32.exe "C:\Users\admin\AppData\Local\Temp\MSIB29A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3781281 653 InstallerActions!InstallerActions.CustomActions.CustomAction1C:\Windows\system32\rundll32.exeMsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3468"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" /i "C:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\1AE960F\ResWorkVPNAppInstaller.msi" AI_EUIMSI=1 APPDIR="C:\Program Files\ResWorkVPN\ResWorkVPN" CLIENTPROCESSID="2760" SECONDSEQUENCE="1" CHAINERUIPROCESSID="2760Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="AI32BitFiles,MainFeature" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" AI_FOUND_PREREQS=".NET Framework 4.0 (web installer)" AI_DETECTED_DOTNET_VERSION="4.7.1" AI_DETECTED_INTERNET_CONNECTION="1" AI_SETUPEXEPATH="C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" SETUPEXEDIR="C:\Users\admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates " TARGETDIR="C:\" AI_SETUPEXEPATH_ORIGINAL="C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" AI_INSTALL="1"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe
ResWorkVPN_1.2.1.exe
User:
admin
Company:
ResWorkVPN
Integrity Level:
HIGH
Description:
Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
Exit code:
0
Version:
1.2.1
3008C:\Windows\system32\MsiExec.exe -Embedding D01BB2C0819652312CA102C25E421C8DC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3012"C:\Windows\Installer\MSICBED.tmp" /RunAsAdmin /HideWindow "C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\install.bat"C:\Windows\Installer\MSICBED.tmpmsiexec.exe
User:
admin
Company:
Caphyon LTD
Integrity Level:
HIGH
Description:
File that launches another file
Exit code:
0
Version:
14.5.1.0
2752"C:\Windows\System32\cmd.exe" /C "C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\install.bat" C:\Windows\System32\cmd.exeMSICBED.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2336tapinstall.exe remove tap0901C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\x86\tapinstall.execmd.exe
User:
admin
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.1.7600.16385 built by: WinDDK
2520tapinstall.exe install OemVista.inf tap0901C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\x86\tapinstall.exe
cmd.exe
User:
admin
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.1.7600.16385 built by: WinDDK
Total events
2 061
Read events
1 328
Write events
0
Delete events
0

Modification events

No data
Executable files
38
Suspicious files
22
Text files
251
Unknown types
15

Dropped files

PID
Process
Filename
Type
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\holder0.aiph
MD5:
SHA256:
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Local\Temp\MSIB012.tmp
MD5:
SHA256:
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Local\Temp\MSIB032.tmp
MD5:
SHA256:
2988MsiExec.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txt
MD5:
SHA256:
2988MsiExec.exeC:\Users\admin\AppData\Local\Temp\tinB04F.tmp.part
MD5:
SHA256:
2988MsiExec.exeC:\Users\admin\AppData\Local\Temp\tinB04F.tmp
MD5:
SHA256:
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\1AE960F\ResWorkVPNAppInstaller.msiexecutable
MD5:291A8216F30E8F14DBA50DAC0D3284A5
SHA256:E65D3A9DD3FFF47948CE436F4EA9E24E7AF589D950C43796AE1144AAC1159F4E
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\decoder.dllexecutable
MD5:1FEB696EB00E47575AA265A5B65EB80F
SHA256:1376D958BA148A0E8E176124AA56C2389ECCDF0151B70C26F27639007656EE0F
2760ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_2760\installlogoiconimage
MD5:488C247C4D7482E34D4576C44CEE79E0
SHA256:EB276449EB326A407CE055001607F212FFCAEF01B5F849BB50A606BD9CD177A6
2988MsiExec.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[2].txttext
MD5:AFA42B4FB6FB4E5434B8B35ABF00DF5A
SHA256:7BDEF8C34E78FB6FD5CD9E4227BDA3E1EB33D54C945C70EE940C1293BABD5FD6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2988
MsiExec.exe
GET
200
216.58.207.68:80
http://www.google.com/
US
html
11.3 Kb
whitelisted
2988
MsiExec.exe
GET
200
216.58.207.68:80
http://www.google.com/
US
html
11.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2988
MsiExec.exe
216.58.207.68:80
www.google.com
Google Inc.
US
whitelisted
1940
ResWorkVPN.exe
104.24.108.149:443
resworkvpn.com
Cloudflare Inc
US
shared
3324
openvpn.exe
24.7.51.129:1194
computerroomnas.myqnapcloud.com
Comcast Cable Communications, LLC
US
unknown

DNS requests

Domain
IP
Reputation
www.google.com
  • 216.58.207.68
whitelisted
resworkvpn.com
  • 104.24.108.149
  • 104.24.109.149
suspicious
computerroomnas.myqnapcloud.com
  • 24.7.51.129
unknown

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info