× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5be0c9ab67e16d2826f223558cb3c7a3676a59d3488dfe25078329e01e61646d
File name: IncrediMailSetup.exe
Detection ratio: 1 / 59
Analysis date: 2017-05-25 14:01:14 UTC ( 5 months ago ) View latest
Antivirus Result Update
DrWeb Adware.IncrediMail.36 20170525
Ad-Aware 20170525
AegisLab 20170525
AhnLab-V3 20170525
Alibaba 20170525
ALYac 20170525
Arcabit 20170525
Avast 20170525
AVG 20170525
Avira (no cloud) 20170525
AVware 20170525
BitDefender 20170525
Bkav 20170525
CAT-QuickHeal 20170525
ClamAV 20170525
CMC 20170524
Comodo 20170525
CrowdStrike Falcon (ML) 20170420
Cyren 20170525
Emsisoft 20170525
Endgame 20170515
ESET-NOD32 20170525
F-Prot 20170525
F-Secure 20170525
Fortinet 20170525
GData 20170525
Sophos ML 20170519
Jiangmin 20170525
K7AntiVirus 20170525
K7GW 20170525
Kaspersky 20170525
Kingsoft 20170525
Malwarebytes 20170525
McAfee 20170525
McAfee-GW-Edition 20170525
Microsoft 20170525
eScan 20170525
NANO-Antivirus 20170525
nProtect 20170525
Palo Alto Networks (Known Signatures) 20170525
Panda 20170524
Qihoo-360 20170525
Rising 20170523
SentinelOne (Static ML) 20170516
Sophos AV 20170525
SUPERAntiSpyware 20170525
Symantec 20170525
Symantec Mobile Insight 20170525
Tencent 20170525
TheHacker 20170525
TotalDefense 20170525
TrendMicro 20170525
TrendMicro-HouseCall 20170525
Trustlook 20170525
VBA32 20170525
VIPRE 20170525
ViRobot 20170525
Webroot 20170525
WhiteArmor 20170524
Yandex 20170518
Zillya 20170525
ZoneAlarm by Check Point 20170525
Zoner 20170525
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 9:41 AM 7/21/2013
Signers
[+] Perion Network Ltd.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 4/24/2012
Valid to 12:59 AM 4/24/2015
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 106D775F09E4628F014361D6B25DB070AF20B1BA
Serial number 45 F8 76 94 FE 8D 19 84 71 97 96 AE C8 03 1D F4
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT qp, maxorder, appended, UTF-8, Unicode, 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-07-21 08:41:02
Entry Point 0x000078F9
Number of sections 6
PE sections
Overlays
MD5 b761803a2747a61fef817cdc78ade28e
File type data
Offset 12471808
Size 6568
Entropy 7.30
PE imports
GetTokenInformation
DuplicateTokenEx
ConvertStringSidToSidW
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
SetTokenInformation
GetLengthSid
RegCloseKey
CreateProcessAsUserW
GetLastError
UnmapViewOfFile
GetModuleFileNameW
GlobalFree
WaitForSingleObject
GetVersionExW
SetEvent
ExitProcess
GetFileAttributesW
lstrlenW
FreeLibrary
GetProcessId
GetCurrentProcess
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
MapViewOfFile
CreateDirectoryW
DeleteFileW
lstrcatW
GetTempFileNameW
EnumResourceNamesW
CreateThread
LoadLibraryW
SetFilePointer
ReadFile
WriteFile
CloseHandle
OpenFileMappingW
GetModuleHandleW
GetExitCodeProcess
LocalFree
GetTempPathW
GetLongPathNameW
CreateEventW
SetCurrentDirectoryW
LoadResource
FindResourceW
CreateFileW
GlobalAlloc
GetProcAddress
SHFileOperationW
ShellExecuteExW
CommandLineToArgvW
GetWindowThreadProcessId
GetSystemMetrics
UnregisterClassW
SetLayeredWindowAttributes
RegisterClassW
GetMessageW
EnumWindows
DefWindowProcW
MoveWindow
LoadStringW
CreateWindowExW
TranslateMessage
SetForegroundWindow
PostMessageW
DispatchMessageW
SetWindowPos
DestroyWindow
Number of PE resources by type
RT_ICON 9
CONTENT 2
RT_STRING 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 14
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:07:21 09:41:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
33792

LinkerVersion
8.0

EntryPoint
0x78f9

InitializedDataSize
12436992

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Execution parents
Compressed bundles
File identification
MD5 ff950e8dcc700c9dc844427d046da57d
SHA1 e943e5dab371312420e686df6dda7811e5857b0e
SHA256 5be0c9ab67e16d2826f223558cb3c7a3676a59d3488dfe25078329e01e61646d
ssdeep
196608:4hChCMHwqKH5ZjDwLwcNmwx3I1xK0ykX3lGqllCyyDhkE6Z16BEQY+4e28BIVlh:UqCMoH7kx41xKayCf1kEZ3Tssh

authentihash e73e0d2ad2387a23e3540f3b9b089c3393074e21e4f942549964d4519f70a0d3
imphash 3dbe544beef4b2ae155ab3946ba6a270
File size 11.9 MB ( 12478376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-07-26 02:28:20 UTC ( 4 years, 3 months ago )
Last submission 2017-07-11 11:32:08 UTC ( 3 months, 2 weeks ago )
File names incredimail-2%20Build%205274.exe
45083573
file-6447147_exe
incredimail-2_6-39-build-5274_fr_298628.exe
filename
IncrediMailSetup.exe
5be0c9ab67e16d2826f223558cb3c7a3676a59d3488dfe25078329e01e61646d
output.45069663.txt
IncrediMailSetup.exe
463-IncrediMailSetup.exe
377892
myfile.exe
incredimail-2+Build+5274.exe
output.45083573.txt
incredimail-2%2BBuild%2B5274.exe
IncrediMailSetup (1).exe
IncrediMailSetup(1)(da filehippo v 2.0).exe
5fb6lwvtoeysiihgq3pw3wtychsyk6yo.exe
45069663
ff950e8dcc700c9dc844427d046da57d-IncrediMailSetup.exe
incredimail_2.5.exe
incredimailsetup.exe
5be0c9ab67e16d2826f223558cb3c7a3676a59d3488dfe25078329e01e61646d
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!