× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bb569c99360a631850537dc2eda0bf85d091cc30bd98b3fd2ac9dabdfb7741da
File name: NPF + TME
Detection ratio: 0 / 66
Analysis date: 2019-04-14 08:11:28 UTC ( 6 days, 8 hours ago )
Antivirus Result Update
Acronis 20190413
Ad-Aware 20190414
AegisLab 20190414
AhnLab-V3 20190413
Alibaba 20190402
ALYac 20190414
Antiy-AVL 20190414
Arcabit 20190414
Avast 20190414
Avast-Mobile 20190414
AVG 20190414
Avira (no cloud) 20190413
Babable 20180918
Baidu 20190318
BitDefender 20190414
Bkav 20190412
CAT-QuickHeal 20190413
ClamAV 20190413
CMC 20190321
Comodo 20190414
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190414
DrWeb 20190414
eGambit 20190414
Emsisoft 20190414
Endgame 20190403
ESET-NOD32 20190414
F-Secure 20190413
FireEye 20190414
Fortinet 20190414
GData 20190414
Ikarus 20190414
Sophos ML 20190313
Jiangmin 20190414
K7AntiVirus 20190414
K7GW 20190414
Kaspersky 20190414
Kingsoft 20190414
Malwarebytes 20190414
MAX 20190414
McAfee 20190414
McAfee-GW-Edition 20190414
Microsoft 20190414
eScan 20190414
NANO-Antivirus 20190414
Palo Alto Networks (Known Signatures) 20190414
Panda 20190414
Qihoo-360 20190414
Rising 20190414
SentinelOne (Static ML) 20190407
Sophos AV 20190414
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190414
Tencent 20190414
TheHacker 20190411
TotalDefense 20190413
Trapmine 20190325
TrendMicro-HouseCall 20190414
Trustlook 20190414
VBA32 20190412
ViRobot 20190413
Yandex 20190412
Zillya 20190412
ZoneAlarm by Check Point 20190414
Zoner 20190413
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Native subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2010-2013 Riverbed Technology, Inc. Copyright © 2005-2010 CACE Technologies. Copyright © 1999-2005 NetGroup, Politecnico di Torino.

Product WinPcap
Original name npf.sys
Internal name NPF + TME
File version 4.1.0.2980
Description npf.sys (NT5/6 x86) Kernel Driver
Signature verification Signed file, verified signature
Signing date 3:48 AM 3/1/2013
Signers
[+] Riverbed Technology, Inc.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 12:00 AM 09/26/2012
Valid to 12:59 AM 10/28/2015
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint C7584F696C2A2DA123C8B9F189D0227102A46FAB
Serial number 14 02 AE EF 0D 31 BE 74 3E 73 F6 A7 A9 60 C4 F4
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 01:00 AM 02/08/2010
Valid to 12:59 AM 02/08/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 01:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 01/01/1997
Valid to 12:59 AM 01/01/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-01 01:28:14
Entry Point 0x00005F05
Number of sections 6
PE sections
Overlays
MD5 71c62f31ff226f9d977bb64c4489ba86
File type data
Offset 28672
Size 7928
Entropy 7.38
PE imports
KfRaiseIrql
KfAcquireSpinLock
KfReleaseSpinLock
KeQueryPerformanceCounter
KfLowerIrql
NdisSystemProcessorCount
NdisAllocatePacket
NdisFreePacket
NdisCloseAdapter
NdisRegisterProtocol
NdisResetEvent
NdisRequest
NdisOpenAdapter
NdisAllocatePacketPool
NdisWaitEvent
NdisInitializeEvent
NdisUnchainBufferAtFront
NdisFreePacketPool
NdisSetEvent
NdisDeregisterProtocol
KeQuerySystemTime
RtlInitUnicodeString
ZwOpenKey
_allmul
RtlAppendUnicodeStringToString
KeInitializeEvent
MmMapLockedPagesSpecifyCache
ZwEnumerateKey
RtlUnwind
_alldiv
memset
_aullrem
IoCreateDevice
ZwSetInformationThread
MmProbeAndLockPages
ExfInterlockedRemoveHeadList
IoDeleteDevice
KeTickCount
KeClearEvent
PsGetVersion
ExAllocatePoolWithTag
RtlWriteRegistryValue
RtlQueryRegistryValues
MmBuildMdlForNonPagedPool
IofCompleteRequest
IoDeleteSymbolicLink
_aulldiv
ExEventObjectType
KeSetEvent
KeResetEvent
ExfInterlockedInsertTailList
ObReferenceObjectByHandle
ObfDereferenceObject
_allrem
ExFreePoolWithTag
KefReleaseSpinLockFromDpcLevel
KefAcquireSpinLockAtDpcLevel
ZwQueryValueKey
IoAllocateMdl
IoCreateSymbolicLink
RtlAppendUnicodeToString
memcpy
KeBugCheckEx
KeWaitForSingleObject
RtlCompareMemory
ZwClose
IoFreeMdl
MmUnlockPages
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

InitializedDataSize
5120

ImageVersion
6.0

ProductName
WinPcap

FileVersionNumber
4.1.0.2980

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
npf.sys

MIMEType
application/octet-stream

Subsystem
Native

FileVersion
4.1.0.2980

TimeStamp
2013:03:01 02:28:14+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
NPF + TME

ProductVersion
4.1.0.2980

FileDescription
npf.sys (NT5/6 x86) Kernel Driver

OSVersion
6.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright 2010-2013 Riverbed Technology, Inc. Copyright 2005-2010 CACE Technologies. Copyright 1999-2005 NetGroup, Politecnico di Torino.

MachineType
Intel 386 or later, and compatibles

CompanyName
Riverbed Technology, Inc.

CodeSize
22400

FileSubtype
7

ProductVersionNumber
4.1.0.2980

EntryPoint
0x5f05

ObjectFileType
Driver

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 25401b0c9576c8456b3e0bbd74ff0771
SHA1 c4f563342ab9eb4228e2c2a281a3fe68edd5624e
SHA256 bb569c99360a631850537dc2eda0bf85d091cc30bd98b3fd2ac9dabdfb7741da
ssdeep
768:r4/2sbo+oeVY7GI5tRdtwA2XxTF4gG1nPYx3f4IUfb4fuKRu:r4/2eo+oeuGIRwAZQRIOrM

authentihash ce530ff04d31c86d6c7792a2ae8c802bf7e335a3876e1105f83ab01f5328c88e
imphash b9e60c558e7f5a4ba3ac7b92a258ed4c
File size 35.7 KB ( 36600 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (native) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.3%)
Win32 Executable (generic) (23.5%)
OS/2 Executable (generic) (10.5%)
Clipper DOS Executable (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe overlay signed native

VirusTotal metadata
First submission 2013-03-11 12:45:04 UTC ( 6 years, 1 month ago )
Last submission 2019-03-01 13:23:55 UTC ( 1 month, 2 weeks ago )
File names fav3c05.tmp
131
npf.sys.vir
fav7637.tmp
_98E57F383BE946AC8EC832CCB330369B
PUBLIC-20170406$$npf32.s
npf77dc6.rra
fav60a0.tmp
npf.sys=
fav5a1b.tmp
npf542f.rra
bb569c99360a6318_npf.sys
PUBLIC-20170426$$npf32.s
fav15ee.tmp
122
npf.sys
favb4d9.tmp
npf.sys
fav1aaf.tmp
fav30f1.tmp
fav5a03.tmp
fav7efa.tmp
npf.sys
{06f9317f-a134-46ba-92c1-0059966f8958}
favd026.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!