× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 78e0d3278a131e83b376b7449cddd1b08ce6002b425dda40cd4112bbce49faf4
File name: Order_Helicopter.doc.exe
Detection ratio: 24 / 43
Analysis date: 2013-04-05 15:10:23 UTC ( 1 year ago ) View latest
Antivirus Result Update
AVG SHeur4.BFMB 20130405
AntiVir TR/Niefol.A 20130405
Avast Win32:Malware-gen 20130405
BitDefender Trojan.Cridex.E 20130405
Comodo UnclassifiedMalware 20130405
DrWeb Trojan.Necurs.97 20130405
ESET-NOD32 Win32/Cridex.AA 20130405
Emsisoft Trojan.Win32.Bublik.albh.AMN (A) 20130405
GData Trojan.Cridex.E 20130405
Ikarus Trojan.Bublik 20130405
Kaspersky Trojan.Win32.Bublik.albh 20130405
Kingsoft Win32.Troj.Agent.zz.(kcloud) 20130401
Malwarebytes Trojan.FakeMS 20130405
McAfee RDN/PWS-Zbot.agg!a 20130405
McAfee-GW-Edition Artemis!97C9C3B4D501 20130405
MicroWorld-eScan Trojan.Cridex.E 20130405
Microsoft Worm:Win32/Cridex.E 20130405
PCTools Malware.Cridex 20130405
Panda Trj/Dtcontx.C 20130405
Sophos Troj/Bredo-AGM 20130405
Symantec W32.Cridex 20130405
TrendMicro BKDR_CRIDEX.HE 20130405
TrendMicro-HouseCall BKDR_CRIDEX.HE 20130405
VIPRE Win32.Malware!Drop 20130405
Agnitum 20130405
AhnLab-V3 20130405
Antiy-AVL 20130405
ByteHero 20130405
CAT-QuickHeal 20130405
ClamAV 20130405
Commtouch 20130405
F-Prot 20130405
Jiangmin 20130405
K7AntiVirus 20130404
NANO-Antivirus 20130405
Norman 20130404
Rising 20130403
SUPERAntiSpyware 20130405
TheHacker 20130405
TotalDefense 20130404
VBA32 20130405
ViRobot 20130405
nProtect 20130405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
© Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft® Windows® Operating System
Original name SYNCAPP.EXE
Internal name syncapp
File version 5.2.3790.0 (srv03_rtm.030324-2048)
Description Create a Briefcase
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-01-27 01:20:11
Link date 2:20 AM 1/27/2007
Entry Point 0x00002909
Number of sections 4
PE sections
PE imports
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetLocaleInfoA
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
SetLastError
ExitProcess
FlushFileBuffers
GetModuleFileNameA
UnhandledExceptionFilter
MultiByteToWideChar
SetFilePointer
CreateThread
SetEnvironmentVariableW
GetExitCodeThread
SetUnhandledExceptionFilter
ExitThread
SetEnvironmentVariableA
TerminateProcess
VirtualQuery
SetEndOfFile
GetCurrentThreadId
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetProcAddress
CompareStringW
FindFirstFileA
CompareStringA
FindNextFileA
lstrcmpW
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetSystemInfo
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
GetCPInfo
HeapSize
GetCommandLineA
InterlockedCompareExchange
QueryPerformanceFrequency
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
lstrcpynA
GetACP
CreateProcessA
HeapCreate
VirtualFree
Sleep
VirtualAlloc
EmptyClipboard
FindWindowExA
CountClipboardFormats
wsprintfW
_amsg_exit
__p__fmode
?terminate@@YAXXZ
_exit
_adjust_fdiv
__p__commode
_cexit
_controlfp
exit
_XcptFilter
__getmainargs
_initterm
__setusermatherr
__set_app_type
Number of PE resources by type
RT_ICON 9
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.2.3790.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
69632

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
5.2.3790.0 (srv03_rtm.030324-2048)

TimeStamp
2007:01:27 02:20:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
syncapp

FileAccessDate
2014:04:22 03:17:51+01:00

ProductVersion
5.2.3790.0

FileDescription
Create a Briefcase

OSVersion
4.0

FileCreateDate
2014:04:22 03:17:51+01:00

OriginalFilename
SYNCAPP.EXE

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
97280

ProductName
Microsoft Windows Operating System

ProductVersionNumber
5.2.3790.0

EntryPoint
0x2909

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 97c9c3b4d50171a07305f91c1885ef9f
SHA1 d08f5e446441e547e9eb5d79bf8d32e1f9273f72
SHA256 78e0d3278a131e83b376b7449cddd1b08ce6002b425dda40cd4112bbce49faf4
ssdeep
1536:jnIYXBerEnoc4OCBAv0x4qbkGqihFB0UVTVBa2wxNXWbcVCWcZP/M/kCngOi:jIZFOaAhSkYhFLVa7/WbsCWaP/M/Hji

imphash d4959999a122347d119168f3d1676609
File size 125.0 KB ( 128000 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2013-04-04 17:06:52 UTC ( 1 year ago )
Last submission 2014-01-15 16:15:49 UTC ( 3 months, 1 week ago )
File names 97c9c3b4d50171a07305f91c1885ef9f.exe
OrderN9923704028.exe
about(38).exe
Order_Helicopter.doc.exe
97C9C3B4D50171A07305F91C1885EF9F
syncapp
123.exe
3573256.exe
KB01148523.exe
58675926
contacts.exe
97c9c3b4d50171a07305f91c1885ef9f
Order_N9923704028.doc.exe
20130406-30.exe
SYNCAPP.EXE
KB00806721.exe
Order_N9923704028.doc.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections
UDP communications