× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 40e78e3fc3268144880e9543b6f09bfdf120d98d26be0319e8b325a5043b885b
File name: cacaoweb.exe
Detection ratio: 0 / 57
Analysis date: 2016-04-03 04:20:04 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160403
AegisLab 20160403
AhnLab-V3 20160402
Alibaba 20160401
ALYac 20160403
Antiy-AVL 20160403
Arcabit 20160403
Avast 20160403
AVG 20160403
Avira (no cloud) 20160402
AVware 20160403
Baidu 20160402
Baidu-International 20160402
BitDefender 20160403
Bkav 20160402
CAT-QuickHeal 20160402
ClamAV 20160402
CMC 20160401
Comodo 20160402
Cyren 20160403
DrWeb 20160403
Emsisoft 20160403
ESET-NOD32 20160402
F-Prot 20160403
F-Secure 20160403
Fortinet 20160402
GData 20160403
Ikarus 20160402
Jiangmin 20160403
K7AntiVirus 20160403
K7GW 20160403
Kaspersky 20160402
Kingsoft 20160403
Malwarebytes 20160403
McAfee 20160403
McAfee-GW-Edition 20160403
Microsoft 20160402
eScan 20160403
NANO-Antivirus 20160403
nProtect 20160401
Panda 20160402
Qihoo-360 20160403
Rising 20160403
Sophos AV 20160403
SUPERAntiSpyware 20160403
Symantec 20160331
Tencent 20160403
TheHacker 20160330
TotalDefense 20160402
TrendMicro 20160403
TrendMicro-HouseCall 20160403
VBA32 20160401
VIPRE 20160403
ViRobot 20160402
Yandex 20160316
Zillya 20160402
Zoner 20160403
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 12:20 AM 3/20/2015
Signers
[+] CACAOWEB Ltd
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer GlobalSign CodeSigning CA - SHA256 - G2
Valid from 01:27 PM 07/09/2014
Valid to 01:27 PM 07/10/2015
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 10B1E6D7C44EE6CE9F719D74D7963C8ADBDDAAFC
Serial number 11 21 F3 BF A3 AB B9 43 07 31 F7 47 54 AD 9D 39 27 02
[+] GlobalSign CodeSigning CA - SHA256 - G2
Status Valid
Issuer GlobalSign
Valid from 09:00 AM 08/02/2011
Valid to 09:00 AM 08/02/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 4E34C4841080D07059EFC1F3C5DE4D79905A36FF
Serial number 04 00 00 00 00 01 31 89 C6 37 E8
[+] GlobalSign Root CA - R3
Status Valid
Issuer GlobalSign
Valid from 10:00 AM 03/18/2009
Valid to 10:00 AM 03/18/2029
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha256RSA
Thumbprint D69B561148F01C77C54578C10926DF5B856976AD
Serial number 04 00 00 00 00 01 21 58 53 08 A2
Counter signers
[+] GlobalSign TSA for MS Authenticode - G2
Status Valid
Issuer GlobalSign Timestamping CA - G2
Valid from 12:00 AM 02/03/2015
Valid to 12:00 AM 03/03/2026
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint B36308B4D4CDED4FCFBD66B955FAE3BFB12C29E6
Serial number 11 21 06 A0 81 D3 3F D8 7A E5 82 4C C1 6B 52 09 4E 03
[+] GlobalSign Timestamping CA - G2
Status Valid
Issuer GlobalSign Root CA
Valid from 09:00 AM 04/13/2011
Valid to 12:00 PM 01/28/2028
Valid usage All
Algorithm sha1RSA
Thumbrint C0E49D2D7D90A5CD427F02D9125694D5D6EC5B71
Serial number 04 00 00 00 00 01 2F 4E E1 52 D7
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 11:00 AM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Packers identified
F-PROT UPX_LZMA
PEiD UPX 2.93 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-03-19 23:17:53
Entry Point 0x0018C900
Number of sections 4
PE sections
Overlays
MD5 7413bc296cc52678e78e8879c66c10f7
File type data
Offset 509952
Size 5936
Entropy 7.43
PE imports
RegCloseKey
GetOpenFileNameW
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
ShellExecuteA
MessageBoxA
WSAGetLastError
Number of PE resources by type
RT_ICON 3
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:03:20 00:17:53+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
495616

LinkerVersion
10.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x18c900

InitializedDataSize
19456

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
1130496

File identification
MD5 0bb8a77b544c70fe6599300d275b9d96
SHA1 d748dd6add4e17d81c96292a240e53d22ee39a90
SHA256 40e78e3fc3268144880e9543b6f09bfdf120d98d26be0319e8b325a5043b885b
ssdeep
12288:Pbp8v1zSuKe0RnLFgGPS9Yh7k+tBzQynfOEO8qoSE:TmvPKeELyrYh7kwhQynfiG

authentihash 88885958fbc9517337998f046392a0a974e90258f4d00ab1a6ed2e737dd6e96c
imphash a48251d90f358445ff5c87c57833262f
File size 503.8 KB ( 515888 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe signed upx overlay

VirusTotal metadata
First submission 2015-03-19 23:36:06 UTC ( 4 years ago )
Last submission 2019-02-03 07:53:03 UTC ( 1 month, 2 weeks ago )
File names cacaonew43dc86.exe
output.14272310.txt
cacaoweb.exe
652959
cacaoweb.exe
cacaoweb.exe
vt-upload-10fCRt
cacaoweb.exe
cacaoweb (1).exe
cacaoweb20170629-18719-1vo4mfm.exe
output.10720603.txt
cacaoweb.exe
cacaoweb.exe
cacaoweb.exe
cacaoweb.exe
926825-3
cacaonew8e9fa0.exe
cacaoweb.exe
10720603
cacaoweb.exe
cacaoweb.exe
cacaoweb.exe_40E78E3FC3268144880E9543B6F09BFDF120D98D26BE0319E8B325A5043B885B
40e78e3fc3268144880e9543b6f09bfdf120d98d26be0319e8b325a5043b885b.exe.000
14272310
cacaoweb.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Shell commands
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications