× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1dee540047bcc94984874c73a4dc6f8d58190bbd7141afaee84087964c4789b2
File name: 9B76BA00990437971029819580862E58.mlw
Detection ratio: 11 / 67
Analysis date: 2018-07-24 08:32:17 UTC ( 10 months ago ) View latest
Antivirus Result Update
AegisLab Uds.Dangerousobject.Multi!c 20180724
Bkav HW32.Packed.4ACC 20180723
CMC Heur.Win32.VBKrypt.3!O 20180724
Endgame malicious (high confidence) 20180711
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180724
Microsoft VirTool:Win32/VBInject 20180724
Palo Alto Networks (Known Signatures) generic.ml 20180724
Qihoo-360 HEUR/QVM03.0.B621.Malware.Gen 20180724
Symantec ML.Attribute.HighConfidence 20180724
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180724
Ad-Aware 20180724
AhnLab-V3 20180723
Alibaba 20180713
ALYac 20180724
Antiy-AVL 20180724
Arcabit 20180724
Avast 20180724
Avast-Mobile 20180724
AVG 20180724
Avira (no cloud) 20180724
AVware 20180724
Babable 20180406
Baidu 20180724
BitDefender 20180724
CAT-QuickHeal 20180723
ClamAV 20180724
Comodo 20180724
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180724
Cyren 20180724
DrWeb 20180724
eGambit 20180724
Emsisoft 20180724
ESET-NOD32 20180724
F-Prot 20180724
F-Secure 20180724
Fortinet 20180724
GData 20180724
Ikarus 20180723
Jiangmin 20180724
K7AntiVirus 20180724
K7GW 20180724
Kingsoft 20180724
Malwarebytes 20180724
MAX 20180724
McAfee 20180724
McAfee-GW-Edition 20180724
eScan 20180724
NANO-Antivirus 20180724
Panda 20180723
Rising 20180724
SentinelOne (Static ML) 20180701
Sophos AV 20180724
SUPERAntiSpyware 20180724
TACHYON 20180724
Tencent 20180724
TheHacker 20180723
TrendMicro 20180724
TrendMicro-HouseCall 20180724
Trustlook 20180724
VBA32 20180723
VIPRE 20180724
ViRobot 20180724
Webroot 20180724
Yandex 20180720
Zillya 20180723
Zoner 20180723
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
sAMsUNG

Product sAMsUNG
Original name Waldmannlein.exe
Internal name Waldmannlein
File version 4.07.0001
Description sAMsUNG
Comments sAMsUNG
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-24 01:39:13
Entry Point 0x000013D4
Number of sections 3
PE sections
PE imports
_adj_fdiv_m32
__vbaChkstk
Ord(645)
_adj_fpatan
__vbaEnd
__vbaStrCmp
Ord(607)
__vbaI4Cy
Ord(516)
__vbaStrMove
_adj_fdivr_m64
_adj_fprem
Ord(697)
EVENT_SINK_AddRef
__vbaLenBstr
Ord(685)
Ord(512)
__vbaFreeObjList
Ord(650)
__vbaStrToUnicode
__vbaVarForInit
__vbaInStr
_adj_fdiv_m32i
__vbaStrCopy
Ord(600)
__vbaExceptHandler
__vbaSetSystemError
__vbaFreeVarList
Ord(632)
Ord(617)
DllFunctionCall
__vbaFPException
__vbaStrVarMove
_adj_fdivr_m16i
__vbaCopyBytes
EVENT_SINK_Release
__vbaCyStr
__vbaExitProc
Ord(100)
Ord(618)
__vbaVarAdd
__vbaFreeVar
__vbaInStrB
__vbaObjSetAddref
_adj_fdiv_r
_adj_fdiv_m64
__vbaFreeObj
__vbaHresultCheckObj
_CIsqrt
_CIsin
_CIlog
Ord(606)
_allmul
__vbaStrVarVal
_CIcos
Ord(595)
EVENT_SINK_QueryInterface
_adj_fptan
Ord(573)
__vbaVarDup
Ord(628)
__vbaObjSet
__vbaI4Var
__vbaStrToAnsi
__vbaVarMove
__vbaVarLateMemSt
_CIatan
__vbaNew2
__vbaVarForNext
__vbaLateIdCallLd
__vbaOnError
_adj_fdivr_m32i
_CItan
_CIexp
__vbaStrI2
__vbaStrR8
_adj_fprem1
_adj_fdivr_m32
__vbaStrCat
Ord(537)
__vbaFreeStrList
__vbaFreeStr
_adj_fdiv_m16i
Number of PE resources by type
RT_ICON 4
RT_STRING 2
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 5
ENGLISH US 3
SLOVENIAN DEFAULT 1
PE resources
ExifTool file metadata
CodeSize
233472

SubsystemVersion
4.0

Comments
sAMsUNG

LinkerVersion
6.0

ImageVersion
4.7

FileSubtype
0

FileVersionNumber
4.7.0.1

LanguageCode
Slovenian

FileFlagsMask
0x0000

FileDescription
sAMsUNG

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
69632

EntryPoint
0x13d4

OriginalFileName
Waldmannlein.exe

MIMEType
application/octet-stream

LegalCopyright
sAMsUNG

FileVersion
4.07.0001

TimeStamp
2018:07:23 18:39:13-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
Waldmannlein

ProductVersion
4.07.0001

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
sAMsUNG

LegalTrademarks
sAMsUNG

ProductName
sAMsUNG

ProductVersionNumber
4.7.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 9b76ba00990437971029819580862e58
SHA1 af43be215d656da08062682204f590e7db67ceba
SHA256 1dee540047bcc94984874c73a4dc6f8d58190bbd7141afaee84087964c4789b2
ssdeep
6144:SAx1N+3FuDqCQ5F1ugqXovQXE5/8D0nm9m9m9m9m9m9m9m9KBNdIgggk0m96Ir:SgokU5byzXTDV0000000s7K6U

authentihash 20951ae6864626e2ff6396050f44042eba5d66df27462782d1f005b9b7dd412c
imphash e5c524c21ed41bed7a275d4a39db98f4
File size 276.0 KB ( 282624 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (68.2%)
Win64 Executable (generic) (22.9%)
Win32 Executable (generic) (3.7%)
OS/2 Executable (generic) (1.6%)
Generic Win/DOS Executable (1.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-24 07:25:17 UTC ( 10 months ago )
Last submission 2018-10-01 11:04:56 UTC ( 7 months, 3 weeks ago )
File names Waldmannlein.exe
azo.exe
9B76BA00990437971029819580862E58.mlw
azo.bin
Waldmannlein
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
DNS requests
TCP connections