analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ResWorkVPN_1.2.1.exe

Full analysis: https://app.any.run/tasks/e8482a87-c2a0-4116-b689-9d35480f5fb7
Verdict: Malicious activity
Analysis date: November 17, 2019, 01:54:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

93CEAEFE32CCAA3623CC0C093759DE39

SHA1:

61D353BB1C0E2BD87A96B72292CD540685DA4B1E

SHA256:

3BCA98C07EF27C5A9939897527FC3A2D313B071258E2208ED986AFF19B132781

SSDEEP:

49152:6mikkfM0X+eChdolxRve1+CUq2ktBBLdsW5bCHwE53BS9Uh+jLAXvyurfB1Lf4iz:6mbEM8+5kwPs0eu9UYjLuvD+0OG7t

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ResWorkVPN_1.2.1.exe (PID: 1956)
      • rundll32.exe (PID: 3368)
      • openvpn.exe (PID: 1820)
      • openvpn.exe (PID: 3196)
    • Writes to a start menu file

      • msiexec.exe (PID: 3100)
    • Application was dropped or rewritten from another process

      • tapinstall.exe (PID: 3976)
      • tapinstall.exe (PID: 1560)
      • ResWorkVPN.exe (PID: 2200)
      • ResWorkVPN.exe (PID: 2800)
      • ResWorkVPN.exe (PID: 3632)
      • ResWorkVPN.exe (PID: 3576)
      • openvpn.exe (PID: 1820)
      • openvpn.exe (PID: 3196)
    • Loads the Task Scheduler DLL interface

      • ResWorkVPN_1.2.1.exe (PID: 1956)
    • Changes settings of System certificates

      • ResWorkVPN.exe (PID: 2200)
  • SUSPICIOUS

    • Creates files in the user directory

      • ResWorkVPN_1.2.1.exe (PID: 1956)
      • MsiExec.exe (PID: 884)
    • Executable content was dropped or overwritten

      • ResWorkVPN_1.2.1.exe (PID: 1956)
      • rundll32.exe (PID: 3368)
      • msiexec.exe (PID: 3100)
      • tapinstall.exe (PID: 3976)
      • DrvInst.exe (PID: 4052)
      • DrvInst.exe (PID: 3828)
      • ResWorkVPN_1.2.1.exe (PID: 2488)
    • Uses RUNDLL32.EXE to load library

      • MsiExec.exe (PID: 884)
      • DrvInst.exe (PID: 4052)
    • Application launched itself

      • ResWorkVPN_1.2.1.exe (PID: 1956)
    • Starts CMD.EXE for commands execution

      • MSID88F.tmp (PID: 2116)
      • ResWorkVPN.exe (PID: 2200)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 4052)
      • DrvInst.exe (PID: 3828)
    • Executed via COM

      • DrvInst.exe (PID: 4052)
      • DrvInst.exe (PID: 3828)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 4052)
      • DrvInst.exe (PID: 3828)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 4052)
      • DrvInst.exe (PID: 3828)
    • Executed as Windows Service

      • vssvc.exe (PID: 2564)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 324)
      • cmd.exe (PID: 2300)
    • Creates files in the program directory

      • ResWorkVPN_1.2.1.exe (PID: 2488)
    • Adds / modifies Windows certificates

      • ResWorkVPN.exe (PID: 2200)
  • INFO

    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 884)
      • MsiExec.exe (PID: 3376)
    • Application launched itself

      • msiexec.exe (PID: 3100)
    • Application was dropped or rewritten from another process

      • MSID88F.tmp (PID: 2116)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 3100)
    • Creates files in the program directory

      • msiexec.exe (PID: 3100)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3100)
    • Searches for installed software

      • DrvInst.exe (PID: 4052)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2564)
    • Manual execution by user

      • ResWorkVPN.exe (PID: 3632)
      • explorer.exe (PID: 2616)
      • ResWorkVPN.exe (PID: 3576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:11:29 13:34:32+01:00
PEType: PE32
LinkerVersion: 14.11
CodeSize: 1152000
InitializedDataSize: 527872
UninitializedDataSize: -
EntryPoint: 0xd0d69
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.2.1.0
ProductVersionNumber: 1.2.1.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Spanish (Modern)
CharacterSet: Unicode
CompanyName: ResWorkVPN
FileDescription: Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
FileVersion: 1.2.1
InternalName: ResWorkVPNInstaladorInstalador
LegalCopyright: Copyright (C) 2019 ResWorkVPN
OriginalFileName: ResWorkVPNInstalador.exeInstalador
ProductName: ResWorkVPNInstalador
ProductVersion: 1.2.1

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Nov-2017 12:34:32
Detected languages:
  • English - United States
  • Spanish - Spain (International sort)
Debug artifacts:
  • C:\Branch\win\Release\stubs\x86\ExternalUi.pdb
CompanyName: ResWorkVPN
FileDescription: Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
FileVersion: 1.2.1
InternalName: ResWorkVPNInstaladorInstalador
LegalCopyright: Copyright (C) 2019 ResWorkVPN
OriginalFileName: ResWorkVPNInstalador.exeInstalador
ProductName: ResWorkVPNInstalador
ProductVersion: 1.2.1

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Nov-2017 12:34:32
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00119314
0x00119400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.64226
.rdata
0x0011B000
0x000543E8
0x00054400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.58461
.data
0x00170000
0x00007154
0x00002400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.19572
.rsrc
0x00178000
0x000159D4
0x00015A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.34124
.reloc
0x0018E000
0x00014AC0
0x00014C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.58253

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.221
1915
Latin 1 / Western European
Spanish - Spain (International sort)
RT_MANIFEST
2
3.1591
9640
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
3
3.46873
4264
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
4
3.54157
2440
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
5
4.01317
1128
Latin 1 / Western European
Spanish - Spain (International sort)
RT_ICON
9
3.31635
1318
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
10
3.31258
2148
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
11
3.27233
734
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
12
3.19114
1476
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING
13
3.32064
896
Latin 1 / Western European
Spanish - Spain (International sort)
RT_STRING

Imports

KERNEL32.dll
msi.dll (delay-loaded)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
86
Monitored processes
29
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start resworkvpn_1.2.1.exe msiexec.exe msiexec.exe rundll32.exe resworkvpn_1.2.1.exe msiexec.exe no specs msid88f.tmp no specs cmd.exe no specs tapinstall.exe no specs tapinstall.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe resworkvpn.exe no specs resworkvpn.exe cmd.exe no specs taskkill.exe no specs explorer.exe no specs resworkvpn.exe no specs resworkvpn.exe openvpn.exe cmd.exe no specs taskkill.exe no specs openvpn.exe route.exe no specs route.exe no specs route.exe no specs route.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1956"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe
explorer.exe
User:
admin
Company:
ResWorkVPN
Integrity Level:
MEDIUM
Description:
Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
Exit code:
0
Version:
1.2.1
3100C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
884C:\Windows\system32\MsiExec.exe -Embedding 74D0DB12DC86C0C212D717DB22E9050E CC:\Windows\system32\MsiExec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3368rundll32.exe "C:\Users\admin\AppData\Local\Temp\MSIC21B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3785312 653 InstallerActions!InstallerActions.CustomActions.CustomAction1C:\Windows\system32\rundll32.exe
MsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2488"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" /i "C:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\1AE960F\ResWorkVPNAppInstaller.msi" AI_EUIMSI=1 APPDIR="C:\Program Files\ResWorkVPN\ResWorkVPN" CLIENTPROCESSID="1956" SECONDSEQUENCE="1" CHAINERUIPROCESSID="1956Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="AI32BitFiles,MainFeature" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" AI_FOUND_PREREQS=".NET Framework 4.0 (web installer)" AI_DETECTED_DOTNET_VERSION="4.7.1" AI_DETECTED_INTERNET_CONNECTION="1" AI_SETUPEXEPATH="C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" SETUPEXEDIR="C:\Users\admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates " TARGETDIR="C:\" AI_SETUPEXEPATH_ORIGINAL="C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe" AI_INSTALL="1"C:\Users\admin\AppData\Local\Temp\ResWorkVPN_1.2.1.exe
ResWorkVPN_1.2.1.exe
User:
admin
Company:
ResWorkVPN
Integrity Level:
HIGH
Description:
Esta base de datos del instalador contiene la lógica y los datos necesarios para instalar ResWorkVPN.
Exit code:
0
Version:
1.2.1
3376C:\Windows\system32\MsiExec.exe -Embedding E103171B03A098DF5746F4D79FA8BB81C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2116"C:\Windows\Installer\MSID88F.tmp" /RunAsAdmin /HideWindow "C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\install.bat"C:\Windows\Installer\MSID88F.tmpmsiexec.exe
User:
admin
Company:
Caphyon LTD
Integrity Level:
HIGH
Description:
File that launches another file
Exit code:
0
Version:
14.5.1.0
2004"C:\Windows\System32\cmd.exe" /C "C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\install.bat" C:\Windows\System32\cmd.exeMSID88F.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1560tapinstall.exe remove tap0901C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\x86\tapinstall.execmd.exe
User:
admin
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.1.7600.16385 built by: WinDDK
3976tapinstall.exe install OemVista.inf tap0901C:\Program Files\ResWorkVPN\ResWorkVPN\drivers\x86\tapinstall.exe
cmd.exe
User:
admin
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.1.7600.16385 built by: WinDDK
Total events
2 133
Read events
1 400
Write events
0
Delete events
0

Modification events

No data
Executable files
41
Suspicious files
24
Text files
268
Unknown types
14

Dropped files

PID
Process
Filename
Type
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\holder0.aiph
MD5:
SHA256:
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Local\Temp\MSIB1E6.tmp
MD5:
SHA256:
884MsiExec.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txt
MD5:
SHA256:
884MsiExec.exeC:\Users\admin\AppData\Local\Temp\tinB224.tmp.part
MD5:
SHA256:
884MsiExec.exeC:\Users\admin\AppData\Local\Temp\tinB224.tmp
MD5:
SHA256:
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\1AE960F\ResWorkVPNAppInstaller.x64.msiexecutable
MD5:27705F4C7878EB773E5E9510030B8FAD
SHA256:A8029E1F3CCED3DB1D6E5F1A7F2BF5A26C25FABAB3101EEB0779C845875900BF
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\1AE960F\ResWorkVPNAppInstaller.msiexecutable
MD5:291A8216F30E8F14DBA50DAC0D3284A5
SHA256:E65D3A9DD3FFF47948CE436F4EA9E24E7AF589D950C43796AE1144AAC1159F4E
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Roaming\ResWorkVPN\ResWorkVPN 1.2.1\install\decoder.dllexecutable
MD5:1FEB696EB00E47575AA265A5B65EB80F
SHA256:1376D958BA148A0E8E176124AA56C2389ECCDF0151B70C26F27639007656EE0F
884MsiExec.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[2].txttext
MD5:5992E298C5673693D42F60E03CFACB73
SHA256:5673591DE2BB9D4C7C41FE7B4C32AAD66F7A0147EE04B1EA618726EB12193308
1956ResWorkVPN_1.2.1.exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_1956\frame_right.bmpimage
MD5:0E1AB770F8D8F8768B66E7DE087087C9
SHA256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3196
openvpn.exe
24.7.51.129:1194
computerroomnas.myqnapcloud.com
Comcast Cable Communications, LLC
US
unknown
884
MsiExec.exe
216.58.207.68:80
www.google.com
Google Inc.
US
whitelisted
2200
ResWorkVPN.exe
104.24.108.149:443
resworkvpn.com
Cloudflare Inc
US
shared
1820
openvpn.exe
24.7.51.129:1194
computerroomnas.myqnapcloud.com
Comcast Cable Communications, LLC
US
unknown

DNS requests

Domain
IP
Reputation
www.google.com
  • 216.58.207.68
whitelisted
resworkvpn.com
  • 104.24.108.149
  • 104.24.109.149
suspicious
computerroomnas.myqnapcloud.com
  • 24.7.51.129
unknown

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info