× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3440b66c9c5e020389b1a4d4a2fe4ced6beffab7520641088ec9fb77ee54d668
File name: servicedesk.exe
Detection ratio: 1 / 67
Analysis date: 2018-12-03 04:24:53 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
Cylance Unsafe 20181203
Ad-Aware 20181203
AegisLab 20181203
AhnLab-V3 20181203
Alibaba 20180921
ALYac 20181203
Arcabit 20181203
Avast 20181203
Avast-Mobile 20181202
AVG 20181203
Avira (no cloud) 20181202
Babable 20180918
Baidu 20181130
BitDefender 20181203
Bkav 20181129
CAT-QuickHeal 20181202
ClamAV 20181203
CMC 20181202
Comodo 20181203
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cyren 20181203
DrWeb 20181203
eGambit 20181203
Emsisoft 20181203
Endgame 20181108
ESET-NOD32 20181202
F-Prot 20181203
F-Secure 20181202
Fortinet 20181203
GData 20181203
Ikarus 20181202
Sophos ML 20181128
Jiangmin 20181203
K7AntiVirus 20181203
K7GW 20181202
Kaspersky 20181203
Kingsoft 20181203
Malwarebytes 20181203
MAX 20181203
McAfee 20181203
McAfee-GW-Edition 20181203
Microsoft 20181203
eScan 20181203
NANO-Antivirus 20181203
Palo Alto Networks (Known Signatures) 20181203
Panda 20181202
Qihoo-360 20181203
Rising 20181203
SentinelOne (Static ML) 20181011
Sophos AV 20181203
SUPERAntiSpyware 20181128
Symantec 20181203
Symantec Mobile Insight 20181121
TACHYON 20181203
Tencent 20181203
TheHacker 20181202
Trapmine 20181128
TrendMicro 20181203
TrendMicro-HouseCall 20181203
Trustlook 20181203
VBA32 20181130
ViRobot 20181202
Webroot 20181203
Yandex 20181130
Zillya 20181130
ZoneAlarm by Check Point 20181203
Zoner 20181203
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-05-10 19:45:56
Entry Point 0x00003E03
Number of sections 4
PE sections
PE imports
WideCharToMultiByte
LoadLibraryW
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
FindNextFileW
GetVersionExW
FreeLibrary
FindNextFileA
FindClose
FindFirstFileA
FindFirstFileW
GetModuleFileNameA
GetProcAddress
GetModuleHandleW
__p__fmode
malloc
sscanf
setlocale
realloc
_getcwd
_wfopen
wcschr
strcat
_stricmp
swprintf
wcstol
toupper
fgets
towupper
fopen
strlen
strncpy
_except_handler3
wcslen
memset
_wgetenv
_wcsdup
wcscmp
strcpy
exit
sprintf
_strdup
__setusermatherr
wcsncpy
wcsrchr
_XcptFilter
_adjust_fdiv
strchr
_wcsicmp
fclose
__p__commode
free
getenv
__wgetmainargs
wcscat
strrchr
_wgetcwd
memcpy
_stat
strtol
swscanf
wcscpy
_exit
_wstat
__p___winitenv
_initterm
_controlfp
strcmp
fgetws
__set_app_type
CreateWindowExA
MessageBoxW
LoadIconA
SetClassLongW
MessageBoxA
LoadIconW
CreateWindowExW
SetClassLongA
Number of PE resources by type
RT_ICON 7
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:05:10 20:45:56+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x3e03

InitializedDataSize
36864

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Compressed bundles
File identification
MD5 019afa3902b494a9698cd027c9e982c1
SHA1 41d9b1f5d19c61e7c07d7d4dfe08c460f5461e6e
SHA256 3440b66c9c5e020389b1a4d4a2fe4ced6beffab7520641088ec9fb77ee54d668
ssdeep
768:TswbG0l5gTlOMA900wReVekjjwMMLnnjjjwwwwwwwwwwwwwwwwwwwwwwwwwwwwwT:wOG0LgT3AhCeV

authentihash e91e8133d2252eae9a393394c985d67103ec1ece5f872670cdb78dec23b67c7b
imphash 04e0c5df114f88a233dc4b3deb63ffd9
File size 52.0 KB ( 53248 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2011-05-10 17:13:01 UTC ( 7 years, 8 months ago )
Last submission 2018-12-03 04:24:53 UTC ( 1 month, 2 weeks ago )
File names alt3c71.tmp
altb9e7.tmp
alt8062.tmp
altd5b7.tmp
alt6740.tmp
alt48b9.tmp
alt3f01.tmp
alt5762.tmp
alt4531.tmp
alt3c60.tmp
altdc3c.tmp
alt8cbb.tmp
alt8271.tmp
alt4f3c.tmp
alt3c5f.tmp
altd598.tmp
alt8cdc.tmp
alta876.tmp
alt94de.tmp
altb2b7.tmp
alt59e0.tmp
alt66fb.tmp
alte311.tmp
alt3c70.tmp
altb402.tmp
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.