× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b68c8b555a3e8dd4b8bce15014f280a7488bfb6062434032c70c451e06b803e5
File name: codexgigas_5f3d9f8e722c9100fe1fde6a07991e769f8ab2f3
Detection ratio: 47 / 69
Analysis date: 2018-08-20 08:34:35 UTC ( 7 months ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40411959 20180820
AhnLab-V3 Worm/Win32.VBNA.C2044715 20180819
Antiy-AVL Worm/Win32.VBNA 20180820
Arcabit Trojan.Generic.D268A337 20180820
Avast Win32:VB-ABYT [Trj] 20180820
AVG Win32:VB-ABYT [Trj] 20180820
Avira (no cloud) TR/Dropper.Gen 20180820
AVware Trojan.Win32.Generic!BT 20180820
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9974 20180820
BitDefender Trojan.GenericKD.40411959 20180820
CAT-QuickHeal Trojan.VBCrypt.MF.1942 20180819
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.e722c9 20180225
Cylance Unsafe 20180820
DrWeb Trojan.DownLoader26.33628 20180820
Emsisoft Trojan.GenericKD.40411959 (B) 20180820
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Ainslot.AA 20180820
F-Secure Trojan.GenericKD.40411959 20180820
Fortinet W32/VBNA.BH!worm 20180820
GData Trojan.GenericKD.40411959 20180820
Ikarus Trojan.Win32.VBKrypt 20180820
Sophos ML heuristic 20180717
Jiangmin Worm.VBNA.alpc 20180820
K7AntiVirus NetWorm ( 700000151 ) 20180820
K7GW NetWorm ( 700000151 ) 20180820
Kaspersky Worm.Win32.VBNA.b 20180820
Malwarebytes Backdoor.Revcode 20180820
MAX malware (ai score=85) 20180820
McAfee W32/Generic!im 20180820
McAfee-GW-Edition BehavesLike.Win32.VBObfus.fm 20180820
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180820
eScan Trojan.GenericKD.40411959 20180820
NANO-Antivirus Trojan.Win32.Ainslot.ewnrji 20180820
Palo Alto Networks (Known Signatures) generic.ml 20180820
Qihoo-360 Win32/Trojan.e6b 20180820
Rising Worm.VBNA!8.2BE (CLOUD) 20180820
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/Generic-S 20180820
Symantec ML.Attribute.HighConfidence 20180820
TACHYON Worm/W32.VB-VBNA.385024.C 20180820
Tencent Win32.Worm.Vbna.Eaxg 20180820
TrendMicro TROJ_VBINJECT_HD200441.UVPM 20180820
TrendMicro-HouseCall TROJ_VBINJECT_HD200441.UVPM 20180820
VBA32 TScope.Trojan.VB 20180817
VIPRE Trojan.Win32.Generic!BT 20180820
ZoneAlarm by Check Point Worm.Win32.VBNA.b 20180820
AegisLab 20180820
Alibaba 20180713
ALYac 20180820
Avast-Mobile 20180819
Babable 20180725
Bkav 20180817
ClamAV 20180820
CMC 20180817
Comodo 20180820
Cyren 20180820
eGambit 20180820
F-Prot 20180820
Kingsoft 20180820
Panda 20180819
SUPERAntiSpyware 20180820
Symantec Mobile Insight 20180814
TheHacker 20180818
TotalDefense 20180820
Trustlook 20180820
ViRobot 20180820
Webroot 20180820
Yandex 20180818
Zillya 20180817
Zoner 20180819
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-29 00:08:39
Entry Point 0x0000131C
Number of sections 3
PE sections
PE imports
EVENT_SINK_QueryInterface
Ord(712)
Ord(546)
Ord(518)
Ord(308)
Ord(521)
Ord(516)
Ord(616)
EVENT_SINK_Invoke
Ord(320)
Ord(527)
Ord(685)
Ord(697)
EVENT_SINK_AddRef
Ord(709)
Ord(594)
Ord(302)
Ord(681)
Ord(665)
Ord(592)
EVENT_SINK_GetIDsOfNames
Ord(717)
Ord(666)
Ord(702)
Ord(307)
Ord(632)
MethCallEngine
DllFunctionCall
Ord(547)
Zombie_GetTypeInfoCount
Ord(626)
Ord(648)
Ord(578)
Ord(543)
Ord(714)
Ord(100)
Zombie_GetTypeInfo
Ord(608)
Ord(544)
Ord(556)
Ord(618)
Ord(301)
Ord(519)
Ord(561)
Ord(520)
Ord(536)
Ord(517)
Ord(542)
Ord(526)
Ord(321)
Ord(319)
ProcCallEngine
Ord(711)
Ord(660)
EVENT_SINK_Release
Ord(713)
Ord(577)
Ord(617)
Ord(573)
Ord(593)
Ord(581)
Ord(528)
Ord(535)
Ord(601)
Ord(716)
__vbaExceptHandler
Ord(607)
Ord(522)
Ord(670)
Ord(644)
Ord(606)
Ord(631)
Ord(553)
Ord(572)
Ord(619)
Ord(537)
Ord(525)
Ord(598)
Ord(545)
Number of PE resources by type
DATA 2
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2017:12:29 01:08:39+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
344064

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x131c

InitializedDataSize
49152

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 8c2c26d39345485cd3fcc0a0f9ca2f99
SHA1 5f3d9f8e722c9100fe1fde6a07991e769f8ab2f3
SHA256 b68c8b555a3e8dd4b8bce15014f280a7488bfb6062434032c70c451e06b803e5
ssdeep
6144:OOI9N0gxfBI07lfbRA1X+j0jfwZ+qL5u1eiLCMQC:hWN0QV7lfbG1ujwwHL5WJCMQC

authentihash 09e4d35362a738e5cca3b5eb142e40dd8bfff98a3ed600dd00c2dbc67f9b984b
imphash 680a46c7dc94843a8b101f70c6477067
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (54.1%)
Win32 Executable MS Visual C++ (generic) (20.6%)
Win64 Executable (generic) (18.2%)
Win32 Executable (generic) (2.9%)
OS/2 Executable (generic) (1.3%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-19 05:00:05 UTC ( 7 months ago )
Last submission 2018-08-19 05:00:05 UTC ( 7 months ago )
File names codexgigas_5f3d9f8e722c9100fe1fde6a07991e769f8ab2f3
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications