× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: aba397ac2db949d1d8690763a6e770f3f18dbfe1e2f8dbccd67498ab6495a724
File name: swhk.dll
Detection ratio: 42 / 66
Analysis date: 2017-12-06 18:36:25 UTC ( 5 days, 5 hours ago )
Antivirus Result Update
Ad-Aware Adware.PriceGong.B 20171206
ALYac Adware.PriceGong.B 20171206
Antiy-AVL GrayWare[AdWare]/Win32.PriceGong.a 20171206
Arcabit Adware.PriceGong.B 20171206
AVware Trojan.Win32.Generic!BT 20171206
BitDefender Adware.PriceGong.B 20171206
Bkav W32.HfsAdware.E6A6 20171206
CAT-QuickHeal PUA.Softbraint.Gen 20171206
Comodo Application.Win32.PriceGong.D 20171206
Cyren W32/Adware.CPCB-8951 20171206
DrWeb Adware.Shopper.859 20171206
Emsisoft Adware.PriceGong.B (B) 20171206
ESET-NOD32 a variant of Win32/PriceGong.C potentially unwanted 20171206
F-Prot W32/Adware.ALSP 20171206
F-Secure Adware.PriceGong.B 20171206
Fortinet Riskware/PriceGong 20171206
GData Adware.PriceGong.B 20171206
Ikarus not-a-virus:AdWare.PriceGong 20171206
Sophos ML heuristic 20170914
Jiangmin AdWare/PriceGong.a 20171206
K7AntiVirus Trojan ( 004b4df61 ) 20171205
K7GW Trojan ( 004b4df61 ) 20171206
Kaspersky not-a-virus:AdWare.Win32.PriceGong.a 20171206
Malwarebytes PUP.Optional.SmartWeb 20171206
MAX malware (ai score=69) 20171206
McAfee Generic PUP.x 20171206
McAfee-GW-Edition Generic PUP.x 20171206
eScan Adware.PriceGong.B 20171206
NANO-Antivirus Riskware.Win32.Shopper.dpncsr 20171206
nProtect Trojan-Clicker/W32.PriceGong.106528 20171206
Panda PUP/SmartBar 20171206
SUPERAntiSpyware PUP.PriceGong/Variant 20171206
Symantec Adware.SmartWeb 20171206
TrendMicro ADW_PRICEGONG 20171206
TrendMicro-HouseCall ADW_PRICEGONG 20171206
VBA32 AdWare.PriceGong 20171206
VIPRE Trojan.Win32.Generic!BT 20171206
ViRobot Adware.Agent.106528.A 20171206
Webroot Pua.Smartweb 20171206
Yandex Riskware.Agent! 20171205
Zillya Adware.PriceGong.Win32.1 20171206
ZoneAlarm by Check Point not-a-virus:AdWare.Win32.PriceGong.a 20171206
AegisLab 20171206
AhnLab-V3 20171206
Alibaba 20171206
Avast 20171206
Avast-Mobile 20171206
AVG 20171206
Avira (no cloud) 20171206
Baidu 20171206
ClamAV 20171206
CMC 20171206
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171206
eGambit 20171206
Endgame 20171130
Kingsoft 20171206
Microsoft 20171206
Palo Alto Networks (Known Signatures) 20171206
Qihoo-360 20171206
Rising 20171206
SentinelOne (Static ML) 20171113
Sophos AV 20171206
Symantec Mobile Insight 20171206
Tencent 20171206
TheHacker 20171205
Trustlook 20171206
WhiteArmor 20171204
Zoner 20171206
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
SoftBrain Technologies Ltd. Copyright (C) 2014

Product SmartWeb
Original name swhk.dll
Internal name swhk.dll
File version 8.0.9.2
Signature verification Signed file, verified signature
Signing date 12:00 PM 2/17/2015
Signers
[+] SoftBrain Technologies Ltd.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 1/13/2015
Valid to 12:59 AM 3/14/2016
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 1A3215DD2758EC7A56B7162D9DB3DCD580274012
Serial number 0E 05 6B E2 C8 2A F2 FA D3 F0 D3 BD 43 38 7A B2
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-02-17 10:57:44
Entry Point 0x0000409F
Number of sections 6
PE sections
Overlays
MD5 a12cf8bca389803b5bb6bcb38c67f845
File type data
Offset 100352
Size 6176
Entropy 7.34
PE imports
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
SetStdHandle
ReleaseMutex
UnmapViewOfFile
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
GetOEMCP
QueryPerformanceCounter
HeapDestroy
HeapAlloc
DisableThreadLibraryCalls
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
lstrlenW
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
SizeofResource
OpenFileMappingW
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
LCMapStringW
LockResource
LoadLibraryExW
GetCPInfo
ExitProcess
TlsGetValue
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetProcessHeap
CreateFileMappingW
WriteFile
RaiseException
UnhandledExceptionFilter
WideCharToMultiByte
MapViewOfFile
TlsFree
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
FindResourceExW
CreateMutexW
CloseHandle
IsProcessorFeaturePresent
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
GetFileType
TerminateProcess
GetConsoleCP
CreateEventW
GetModuleHandleExW
IsValidCodePage
LoadResource
FindResourceW
CreateFileW
OutputDebugStringW
IsDebuggerPresent
Sleep
SetLastError
TlsSetValue
EncodePointer
GetCurrentThreadId
WriteConsoleW
LeaveCriticalSection
GetWindowThreadProcessId
GetClassNameW
SendMessageW
PostThreadMessageW
UnhookWindowsHookEx
SendNotifyMessageW
GetParent
SetWindowsHookExW
GetWindowLongW
SetWinEventHook
CallNextHookEx
PE exports
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
8.0.9.2

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
44544

EntryPoint
0x409f

OriginalFileName
swhk.dll

MIMEType
application/octet-stream

LegalCopyright
SoftBrain Technologies Ltd. Copyright (C) 2014

FileVersion
8.0.9.2

TimeStamp
2015:02:17 11:57:44+01:00

FileType
Win32 DLL

PEType
PE32

InternalName
swhk.dll

ProductVersion
8.0.9.2

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SoftBrain Technologies Ltd.

CodeSize
62976

ProductName
SmartWeb

ProductVersionNumber
8.0.9.2

FileTypeExtension
dll

ObjectFileType
Dynamic link library

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Compressed bundles
File identification
MD5 bce139e3d1b13ab38b58e645abe30679
SHA1 080016256c564232771ed8d6effc94ecaecad316
SHA256 aba397ac2db949d1d8690763a6e770f3f18dbfe1e2f8dbccd67498ab6495a724
ssdeep
1536:oceowwca+AsMCpfWk3iqnAdhmLBo56949vHPczYyINsWjcddZ72YMY0i:ogsaciqnmguH4YwX72YMZi

authentihash 03f4d0d148f3c174e6733c0a98cbc42695632c8722e361bb7c0e8cf0b80be6bc
imphash d764abe1a40f738a33e4c70c6f2571c2
File size 104.0 KB ( 106528 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.4%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
pedll signed overlay

VirusTotal metadata
First submission 2015-02-17 23:24:06 UTC ( 2 years, 9 months ago )
Last submission 2017-12-06 18:36:25 UTC ( 5 days, 5 hours ago )
File names swhk.dll
swhk.dll
swhk.dll
swhk.dll
swhk.dll1
swhk.dll
swhk.dll
swhk.dll
swhk_IObitDel.dll
swhk.dll
swhk.dll
avz00016.dta
swhk.dl
swhk.dll
swhk.dll
61fdc96a9156e75b93e56a77710e724e_swhk.dll.safe
avz00022.dta
sample.exe
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R02JC0ELO15.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!