× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1b5f6afda5447f95a47ad060c1dbf0169f91723a9d1a18d395264227e2106cf0
File name: example1.exe
Detection ratio: 1 / 62
Analysis date: 2018-01-30 18:10:27 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
McAfee-GW-Edition BehavesLike.Win32.Downloader.nh 20180130
Ad-Aware 20180130
AegisLab 20180130
AhnLab-V3 20180130
Alibaba 20180130
ALYac 20180130
Antiy-AVL 20180130
Arcabit 20180130
Avast 20180130
Avast-Mobile 20180130
AVG 20180130
Avira (no cloud) 20180130
AVware 20180130
Baidu 20180130
BitDefender 20180130
Bkav 20180130
CAT-QuickHeal 20180130
ClamAV 20180130
CMC 20180130
Comodo 20180130
CrowdStrike Falcon (ML) 20170201
Cybereason 20171103
Cyren 20180130
DrWeb 20180130
eGambit 20180130
Emsisoft 20180130
Endgame 20171130
ESET-NOD32 20180130
F-Prot 20180130
Fortinet 20180130
GData 20180130
Ikarus 20180130
Sophos ML 20180121
Jiangmin 20180130
K7AntiVirus 20180130
K7GW 20180130
Kaspersky 20180130
Kingsoft 20180130
Malwarebytes 20180130
MAX 20180130
McAfee 20180130
Microsoft 20180130
eScan 20180130
NANO-Antivirus 20180130
nProtect 20180130
Palo Alto Networks (Known Signatures) 20180130
Panda 20180130
Qihoo-360 20180130
Rising 20180130
SentinelOne (Static ML) 20180115
Sophos AV 20180130
SUPERAntiSpyware 20180130
Symantec 20180130
Symantec Mobile Insight 20180126
Tencent 20180130
TheHacker 20180130
Trustlook 20180130
VBA32 20180130
VIPRE 20180130
ViRobot 20180130
Webroot 20180130
Yandex 20180130
Zillya 20180130
ZoneAlarm by Check Point 20180130
Zoner 20180130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-30 03:57:45
Entry Point 0x0000320C
Number of sections 5
PE sections
Overlays
MD5 bfb15b79807bbafecf21b3746fb8c3c1
File type data
Offset 36352
Size 1270
Entropy 7.82
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GetProcAddress
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GlobalLock
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 4
RT_ICON 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:01:30 04:57:45+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
25600

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
162816

SubsystemVersion
4.0

EntryPoint
0x320c

OSVersion
4.0

ImageVersion
6.0

UninitializedDataSize
1024

File identification
MD5 e0272d568468838a409a3a979b12b412
SHA1 a44d311fbc6807bfd0596ad6a2528efb996e0e29
SHA256 1b5f6afda5447f95a47ad060c1dbf0169f91723a9d1a18d395264227e2106cf0
ssdeep
768:KnHmFZIFRQp8lDhdQLErWV/AVHxI0Z0D32uInmyd0cPbaNH:EHYMiClDhdyA5x5Z0DvyecPbap

authentihash c5e193fe21c93ccbbb584fff0192690d92bc821851d5018950ecd1d3a78e7f55
imphash 3abe302b6d9a1256e6a915429af4ffd2
File size 36.7 KB ( 37622 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe cve-2016-0099 exploit overlay

VirusTotal metadata
First submission 2018-01-30 18:10:27 UTC ( 1 year, 1 month ago )
Last submission 2018-04-04 19:48:07 UTC ( 11 months, 2 weeks ago )
File names example1.exe
aa
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Deleted files
Created mutexes
Runtime DLLs