× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85248198cb8bd8b0c2ce6840d0346b747515dfe2b180b50d0d9c68000d1e0977
File name: 763ta1.exe
Detection ratio: 51 / 54
Analysis date: 2016-07-08 04:18:34 UTC ( 2 years, 8 months ago )
Antivirus Result Update
Ad-Aware Trojan.Generic.KD.914347 20160708
AegisLab Packer.W32.Krap.lJyH 20160708
AhnLab-V3 Trojan/Win32.HmBlocker.N955372703 20160707
ALYac Trojan.Generic.KD.914347 20160708
Antiy-AVL Worm[Net]/Win32.Kolab 20160708
Arcabit Trojan.Generic.KD.DDF3AB 20160708
Avast Win32:Malware-gen 20160708
AVG Dropper.Generic7.COFM 20160708
Avira (no cloud) TR/Dropper.Gen 20160708
AVware Trojan.Win32.Agent.aaxv (v) 20160708
Baidu Win32.Trojan.Injector.dt 20160706
BitDefender Trojan.Generic.KD.914347 20160708
Bkav W32.KeyloggerLTHVAP.Trojan 20160707
CAT-QuickHeal Trojan.Ircbrute.SU5 20160707
ClamAV Win.Trojan.Agent-1073066 20160708
Comodo TrojWare.Win32.Injector.BGJ 20160708
Cyren W32/Trojan.WLUI-7811 20160708
DrWeb BackDoor.Gurl.2 20160708
Emsisoft Trojan.Generic.KD.914347 (B) 20160708
ESET-NOD32 Win32/Injector.AEJX 20160707
F-Prot W32/Trojan2.NWBR 20160708
F-Secure Trojan.Generic.KD.914347 20160708
Fortinet W32/Injector.AEJX!tr 20160708
GData Trojan.Generic.KD.914347 20160708
Ikarus Trojan.Win32.Ircbrute 20160707
Jiangmin Backdoor/Azbreg.aoo 20160707
K7AntiVirus Trojan ( 0040f5791 ) 20160707
K7GW Trojan ( 0040f5791 ) 20160708
Kaspersky HEUR:Trojan.Win32.Generic 20160708
Malwarebytes Worm.AutoRun 20160708
McAfee Obfuscated-FQV!hb 20160708
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.pt 20160708
Microsoft Trojan:Win32/Lethic.B 20160708
eScan Trojan.Generic.KD.914347 20160708
NANO-Antivirus Trojan.Win32.Gurl.brorzr 20160708
nProtect Trojan.Generic.KD.914347 20160707
Panda Trj/Zbot.M 20160707
Qihoo-360 HEUR/Malware.QVM07.Gen 20160708
Sophos AV Troj/Agent-AAXV 20160708
SUPERAntiSpyware Trojan.Agent/Gen-Undef 20160708
Symantec Packed.Generic.326 20160708
Tencent Win32.Trojan.Generic.Pgwh 20160708
TheHacker Trojan/Injector.aejx 20160707
TotalDefense Win32/Lethic.THCJaN 20160708
TrendMicro TROJ_LETHIC.OU 20160708
TrendMicro-HouseCall TROJ_SPNR.14IN13 20160708
VBA32 BScope.Backdoor.IRCBot.2122 20160707
VIPRE Trojan.Win32.Agent.aaxv (v) 20160708
ViRobot Worm.Win32.Net-Kolab.68231[h] 20160707
Zillya Trojan.HmBlocker.Win32.3851 20160707
Zoner Trojan.Lethic.AA 20160708
Alibaba 20160708
CMC 20160704
Kingsoft 20160708
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-10-28 19:00:30
Entry Point 0x0000160F
Number of sections 5
PE sections
Overlays
MD5 d1ebedff4e0a4e13244bbafc959a7543
File type ASCII text
Offset 40960
Size 3045
Entropy 0.00
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
AddAtomA
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetStartupInfoA
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
GetTickCount
TlsSetValue
HeapAlloc
GetVersion
VirtualAlloc
SetLastError
LeaveCriticalSection
DrawAnimatedRects
FlashWindowEx
Number of PE resources by type
Struct(202) 1
Struct(211) 1
Number of PE resources by language
GERMAN NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:10:28 20:00:30+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
16384

SubsystemVersion
4.0

EntryPoint
0x160f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 bb6370eb22768b3758707b1cd66d791d
SHA1 11cad9ae5091187e26d71e9155c2409c25e62d0f
SHA256 85248198cb8bd8b0c2ce6840d0346b747515dfe2b180b50d0d9c68000d1e0977
ssdeep
384:7pcTPJTRb47dEbmltqyA6FVvQQVU+oE3ljGrzAZX+4EIYA9:7CbJTWdEDgbvXF3ljrZXNE1s

authentihash e4406098c77321cf84c014cf3e4131c94ef9f70a86ce33201c5a1375f5525b23
imphash b41f22486d4aa79695588232cb2c7b00
File size 43.0 KB ( 44005 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (56.7%)
Win32 Executable MS Visual C++ (generic) (29.1%)
Win32 Dynamic Link Library (generic) (6.1%)
Win32 Executable (generic) (4.2%)
Generic Win/DOS Executable (1.8%)
Tags
peexe armadillo usb-autorun overlay

VirusTotal metadata
First submission 2013-09-17 07:02:49 UTC ( 5 years, 6 months ago )
Last submission 2016-04-03 22:11:06 UTC ( 2 years, 11 months ago )
File names file-5984994_
p98w7.exe
763ta1.exe
763ta1.exe
5afd.exe
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
UDP communications