× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6223337262db664e4fbc6983adbdcefe6215451b5423d6b2eef7713613962f15
File name: a (4).exe
Detection ratio: 34 / 68
Analysis date: 2018-09-10 11:32:56 UTC ( 8 months, 2 weeks ago ) View latest
Antivirus Result Update
Arcabit Trojan.Generic.D2694AAF 20180910
Avast Win32:Malware-gen 20180910
AVG Win32:Malware-gen 20180910
Avira (no cloud) TR/Injector.biwnh 20180910
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9940 20180910
BitDefender Trojan.GenericKD.40454831 20180910
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cybereason malicious.ce7a2f 20180225
Cylance Unsafe 20180910
Cyren W32/Trojan.XNWP-1233 20180910
Emsisoft Trojan.GenericKD.40454831 (B) 20180910
Endgame malicious (high confidence) 20180730
ESET-NOD32 NSIS/Injector.ADD 20180910
F-Secure Trojan.GenericKD.40454831 20180910
Fortinet W32/Injector.EAGF!tr 20180910
GData NSIS.Trojan-Ransom.GandCrab.H 20180910
Ikarus Trojan.Injector 20180910
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0053befc1 ) 20180910
K7GW Trojan ( 0053befc1 ) 20180910
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen 20180910
Malwarebytes Trojan.MalPack.NSIS 20180910
MAX malware (ai score=89) 20180910
McAfee RDN/Generic.dx 20180910
McAfee-GW-Edition BehavesLike.Win32.Vopak.dc 20180910
Microsoft Trojan:Win32/Tiggre!plock 20180910
eScan Trojan.GenericKD.40454831 20180910
Rising Trojan.Injector!8.C4 (CLOUD) 20180910
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/Generic-S 20180910
Symantec Trojan.Gen.2 20180910
TrendMicro TROJ_GE.FCABD75A 20180910
TrendMicro-HouseCall TROJ_GE.FCABD75A 20180910
ZoneAlarm by Check Point HEUR:Trojan-Spy.Win32.Noon.gen 20180910
Ad-Aware 20180910
AegisLab 20180910
AhnLab-V3 20180910
Alibaba 20180713
ALYac 20180910
Antiy-AVL 20180910
Avast-Mobile 20180910
AVware 20180910
Babable 20180907
Bkav 20180906
CAT-QuickHeal 20180909
ClamAV 20180910
CMC 20180910
Comodo 20180910
DrWeb 20180910
eGambit 20180910
F-Prot 20180910
Jiangmin 20180910
Kingsoft 20180910
NANO-Antivirus 20180910
Palo Alto Networks (Known Signatures) 20180910
Panda 20180909
Qihoo-360 20180910
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180905
TACHYON 20180910
Tencent 20180910
TheHacker 20180907
TotalDefense 20180910
Trustlook 20180910
VBA32 20180907
VIPRE 20180910
ViRobot 20180910
Webroot 20180910
Yandex 20180908
Zillya 20180908
Zoner 20180910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-30 03:57:31
Entry Point 0x000031D6
Number of sections 5
PE sections
Overlays
MD5 a7cfde5da83becbeffe17246225a9e7c
File type data
Offset 34816
Size 240215
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GetProcAddress
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GlobalLock
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 3
RT_ICON 1
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 6
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:01:30 04:57:31+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x31d6

InitializedDataSize
118784

SubsystemVersion
4.0

ImageVersion
6.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 29d4207ce7a2f97370e6143160a47c73
SHA1 93b881357f74c288714178145fdf1d5f0feedc63
SHA256 6223337262db664e4fbc6983adbdcefe6215451b5423d6b2eef7713613962f15
ssdeep
6144:zDlUvh9bXTmpJcWIuetjLfBVH6z9XJ59iDM2JfoIzORkVXhUaR:lUXypJcluKBgR53i7f/R

authentihash 31d39a05286a040c090e710689298162aa4d0a821e771422dd732ab6ca00c68f
imphash 3abe302b6d9a1256e6a915429af4ffd2
File size 268.6 KB ( 275031 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2018-09-10 11:32:56 UTC ( 8 months, 2 weeks ago )
Last submission 2018-10-01 01:49:02 UTC ( 7 months, 3 weeks ago )
File names a (4).exe
a.exe
output.114032646.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs