× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 785570e85282d77c21e88c58e941774913021e697c6c72236809d4c760cb8e45
File name: ti.exe
Detection ratio: 29 / 69
Analysis date: 2019-02-25 10:22:05 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.467506 20190225
AegisLab Trojan.Win32.Razy.4!c 20190225
AhnLab-V3 Trojan/Win32.VBCrypt.C3038904 20190225
ALYac Gen:Variant.Razy.467506 20190225
Arcabit Trojan.Razy.D72232 20190225
BitDefender Gen:Variant.Razy.467506 20190225
Bkav HW32.Packed. 20190222
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.1b0c95 20190109
Cylance Unsafe 20190225
Emsisoft Gen:Variant.Razy.467506 (B) 20190225
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/GenKryptik.DAOR 20190225
GData Gen:Variant.Razy.467506 20190225
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190225
MAX malware (ai score=89) 20190225
McAfee Artemis!37E402D1824A 20190225
McAfee-GW-Edition Artemis!Trojan 20190225
Microsoft VirTool:Win32/VBInject.ACH!bit 20190225
eScan Gen:Variant.Razy.467506 20190225
Palo Alto Networks (Known Signatures) generic.ml 20190225
Qihoo-360 HEUR/QVM03.0.763D.Malware.Gen 20190225
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20190225
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/FareitVB-N 20190225
Symantec ML.Attribute.HighConfidence 20190225
Trapmine malicious.moderate.ml.score 20190123
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190225
Acronis 20190222
Alibaba 20180921
Antiy-AVL 20190225
Avast 20190225
Avast-Mobile 20190225
AVG 20190225
Avira (no cloud) 20190225
Babable 20180918
Baidu 20190215
CAT-QuickHeal 20190224
ClamAV 20190224
CMC 20190225
Comodo 20190225
Cyren 20190225
DrWeb 20190225
eGambit 20190225
F-Prot 20190225
F-Secure 20190225
Fortinet 20190225
Ikarus 20190225
Jiangmin 20190225
K7AntiVirus 20190225
K7GW 20190225
Kingsoft 20190225
Malwarebytes 20190225
NANO-Antivirus 20190225
Panda 20190224
SUPERAntiSpyware 20190220
Symantec Mobile Insight 20190220
TACHYON 20190225
Tencent 20190225
TheHacker 20190225
TrendMicro-HouseCall 20190225
Trustlook 20190225
VBA32 20190225
VIPRE 20190225
ViRobot 20190225
Webroot 20190225
Yandex 20190222
Zillya 20190222
Zoner 20190225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product DEMMY
Original name Banpara4.exe
Internal name Banpara4
File version 1.05.0006
Comments TENOSITIS2
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 11:23 AM 2/25/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-02-13 22:53:48
Entry Point 0x0000104C
Number of sections 3
PE sections
Overlays
MD5 667661357494d8c2b601cb807f2f07bd
File type data
Offset 495616
Size 2216
Entropy 7.68
PE imports
EVENT_SINK_QueryInterface
__vbaExceptHandler
Ord(632)
MethCallEngine
EVENT_SINK_Release
Ord(100)
EVENT_SINK_AddRef
Number of PE resources by type
RT_ICON 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 2
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
TENOSITIS2

InitializedDataSize
12288

ImageVersion
1.5

FileSubtype
0

FileVersionNumber
1.5.0.6

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

EntryPoint
0x104c

OriginalFileName
Banpara4.exe

MIMEType
application/octet-stream

FileVersion
1.05.0006

TimeStamp
2008:02:13 23:53:48+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Banpara4

ProductVersion
1.05.0006

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
483328

ProductName
DEMMY

ProductVersionNumber
1.5.0.6

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 37e402d1824ac656ff97edb2f0af39a7
SHA1 960963e1b0c955f8b113cf41820727abc7f99cdd
SHA256 785570e85282d77c21e88c58e941774913021e697c6c72236809d4c760cb8e45
ssdeep
12288:Xf5qxY/887buLJZOOzmxH72REEg/+jrh9:XfcS88m94OzObj92jV9

authentihash 07fe29130f1b4727d3a93b38ac594ebeec50bfa4c639076055e861734c520959
imphash e214f95f7f3a3181be62d978fbf0219c
File size 486.2 KB ( 497832 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (82.7%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
OS/2 Executable (generic) (2.0%)
Generic Win/DOS Executable (2.0%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-02-25 07:25:45 UTC ( 2 months, 3 weeks ago )
Last submission 2019-02-25 10:22:05 UTC ( 2 months, 3 weeks ago )
File names Banpara4.exe
Banpara4
ti.exe
ti.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.