File name:

WolferVPN.exe

Full analysis: https://app.any.run/tasks/c20e30bc-3d15-412c-986f-df57f2e23f39
Verdict: Malicious activity
Analysis date: December 02, 2023, 20:58:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

6434CEAFA88A3AFA1F8351BC6890B2A5

SHA1:

700B43DB6881BC83C6D7ACB0D020283DCA4FA7BA

SHA256:

DB230E271893BE37515E7BF1403352D99A5F8AC441C2DF589551EE399DEA7315

SSDEEP:

1572864:p193auyQM2TQ/Rhiw10Ly54VBP000tjP9cn:P93aQpnu5MBc0q9cn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WolferVPN.exe (PID: 1228)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • WolferVPN.exe (PID: 1228)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • WolferVPN.exe (PID: 1228)
    • Process drops legitimate windows executable

      • WolferVPN.exe (PID: 1228)
    • The process creates files with name similar to system file names

      • WolferVPN.exe (PID: 1228)
  • INFO

    • Checks supported languages

      • WolferVPN.exe (PID: 1228)
    • Reads the computer name

      • WolferVPN.exe (PID: 1228)
    • Reads the machine GUID from the registry

      • WolferVPN.exe (PID: 1228)
    • Manual execution by a user

      • WolferVPN.exe (PID: 2860)
    • Create files in a temporary directory

      • WolferVPN.exe (PID: 1228)
    • Creates files or folders in the user directory

      • WolferVPN.exe (PID: 1228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 23:26:14+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 473088
UninitializedDataSize: 16384
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: 2023 WolferVPN
FileVersion: 1.0.0
LegalCopyright: Copyright © 2023
ProductName: WolferVPN
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wolfervpn.exe no specs wolfervpn.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Users\admin\AppData\Local\Temp\WolferVPN.exe" C:\Users\admin\AppData\Local\Temp\WolferVPN.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
2023 WolferVPN
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wolfervpn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2860"C:\Users\admin\AppData\Local\Programs\WolferVPN\WolferVPN.exe" C:\Users\admin\AppData\Local\Programs\WolferVPN\WolferVPN.exeexplorer.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
WolferVPN
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\programs\wolfervpn\wolfervpn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\wolfervpn\ffmpeg.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
719
Read events
719
Write events
0
Delete events
0

Modification events

No data
Executable files
19
Suspicious files
120
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\app-64.7z
MD5:
SHA256:
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\icudtl.dat
MD5:
SHA256:
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\chrome_200_percent.pakpgc
MD5:81B5B74FE16C7C81870F539D5C263397
SHA256:CB4FD141A5C4D188A3ECB203E9D41A3AFCA648724160E212289ADCAC666FBFF4
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\SpiderBanner.dllexecutable
MD5:17309E33B596BA3A5693B4D3E85CF8D7
SHA256:996A259E53CA18B89EC36D038C40148957C978C0FD600A268497D4C92F882A93
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\chrome_100_percent.pakbinary
MD5:443C58245EEB233D319ABF7150B99C31
SHA256:99CA6947D97DF212E45782BBD5D97BFB42112872E1C42BAB4209CEEDF66DC760
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\nsis7z.dllexecutable
MD5:80E44CE4895304C6A3A831310FBF8CD0
SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\LICENSE.electron.txttext
MD5:4D42118D35941E0F664DDDBD83F633C5
SHA256:5154E165BD6C2CC0CFBCD8916498C7ABAB0497923BAFCD5CB07673FE8480087D
1228WolferVPN.exeC:\Users\admin\AppData\Local\Temp\nsn721E.tmp\7z-out\locales\ar.pakbinary
MD5:7294148BA219909A4909613381EA45AC
SHA256:ACC1B352EA206C25AFE88A614346B468F4F78BF23F886883A38DAE905D121DC0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
324
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info