× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bdeb58009ea32b34676790a34db654eda2827cb2b114fa9b6716986c609e4326
Detection ratio: 0 / 68
Analysis date: 2018-02-10 01:47:02 UTC ( 2 weeks, 1 day ago ) View latest
Antivirus Result Update
Ad-Aware 20180209
AegisLab 20180210
AhnLab-V3 20180209
Alibaba 20180209
ALYac 20180209
Antiy-AVL 20180210
Arcabit 20180210
Avast 20180209
Avast-Mobile 20180209
AVG 20180209
Avira (no cloud) 20180210
AVware 20180209
Baidu 20180208
BitDefender 20180209
Bkav 20180209
CAT-QuickHeal 20180209
ClamAV 20180210
CMC 20180209
Comodo 20180209
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180210
Cyren 20180210
DrWeb 20180210
eGambit 20180210
Emsisoft 20180210
Endgame 20171130
ESET-NOD32 20180210
F-Prot 20180210
F-Secure 20180210
Fortinet 20180210
GData 20180210
Ikarus 20180209
Sophos ML 20180121
Jiangmin 20180209
K7AntiVirus 20180209
K7GW 20180210
Kaspersky 20180210
Kingsoft 20180210
Malwarebytes 20180210
MAX 20180210
McAfee 20180210
McAfee-GW-Edition 20180209
Microsoft 20180210
eScan 20180209
NANO-Antivirus 20180210
nProtect 20180209
Palo Alto Networks (Known Signatures) 20180210
Panda 20180209
Qihoo-360 20180210
Rising 20180210
SentinelOne (Static ML) 20180115
Sophos AV 20180210
SUPERAntiSpyware 20180209
Symantec 20180209
Symantec Mobile Insight 20180209
Tencent 20180210
TheHacker 20180208
TotalDefense 20180209
TrendMicro 20180210
TrendMicro-HouseCall 20180210
Trustlook 20180210
VBA32 20180209
VIPRE 20180210
ViRobot 20180210
Webroot 20180210
WhiteArmor 20180205
Yandex 20180207
Zillya 20180209
ZoneAlarm by Check Point 20180210
Zoner 20180210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name SetupPrep.exe
Internal name SetupPrep.exe
File version 10.0.14393.0 (rs1_release.160715-1616)
Description Windows 10 Setup
Signature verification Signed file, verified signature
Signing date 2:43 PM 7/16/2016
Signers
[+] Microsoft Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Code Signing PCA
Valid from 6:42 PM 6/4/2015
Valid to 6:42 PM 9/4/2016
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 3BDA323E552DB1FDE5F4FBEE75D6D5B2B187EEDC
Serial number 33 00 00 01 0A 2C 79 AE D7 79 7B A6 AC 00 01 00 00 01 0A
[+] Microsoft Code Signing PCA
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 11:19 PM 8/31/2010
Valid to 11:29 PM 8/31/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 3CAF9BA2DB5570CAF76942FF99101B993888E257
Serial number 61 33 26 1A 00 00 00 00 00 31
[+] Microsoft Root Certificate Authority
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 12:19 AM 5/10/2001
Valid to 12:28 AM 5/10/2021
Valid usage All
Algorithm sha1RSA
Thumbprint CDD4EEAE6000AC7F40C3802C171E30148030C072
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
Counter signers
[+] Microsoft Time-Stamp Service
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Time-Stamp PCA
Valid from 8:21 PM 3/30/2016
Valid to 8:21 PM 6/30/2017
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint A1F3FE643CAC735D7976F27DE33004BE9A309A87
Serial number 33 00 00 00 99 AA C5 81 9F 8C A2 7D 8A 00 00 00 00 00 99
[+] Microsoft Time-Stamp PCA
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 1:53 PM 4/3/2007
Valid to 2:03 PM 4/3/2021
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 375FCB825C3DC3752A02E34EB70993B4997191EF
Serial number 61 16 68 34 00 00 00 00 00 1C
[+] Microsoft Root Certificate Authority
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 12:19 AM 5/10/2001
Valid to 12:28 AM 5/10/2021
Valid usage All
Algorithm sha1RSA
Thumbrint CDD4EEAE6000AC7F40C3802C171E30148030C072
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
Packers identified
F-PROT CAB, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-07-16 01:33:15
Entry Point 0x0002C530
Number of sections 6
PE sections
Overlays
MD5 d7f7563cec9f4383f5d39c21007c866b
File type data
Offset 11200512
Size 7108816
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
CopySid
GetAce
GetTraceEnableFlags
InitializeAcl
RegSetKeySecurity
RegEnumKeyW
RegDeleteKeyW
CheckTokenMembership
RegisterTraceGuidsW
RegQueryValueExW
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
AddAccessAllowedAce
RegOpenKeyExW
CreateProcessAsUserW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
QueryAllTracesW
UnregisterTraceGuids
RegQueryInfoKeyW
StopTraceW
RegEnumValueW
GetTraceEnableLevel
OpenThreadToken
GetLengthSid
SetSecurityInfo
AdjustTokenPrivileges
RegDeleteValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
LookupPrivilegeValueW
GetTraceLoggerHandle
InitCommonControlsEx
Ord(23)
Ord(20)
Ord(22)
GetDeviceCaps
TranslateCharsetInfo
SetBrushOrgEx
DeleteDC
CreateFontIndirectW
SetBkMode
CreateDCW
GetStockObject
EnumFontFamiliesExW
CreateICW
CreateSolidBrush
GetObjectW
BitBlt
CreateCompatibleDC
StretchBlt
SetTextColor
GetDriveTypeW
GetOverlappedResult
SetEvent
GetFileAttributesW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetFileInformationByHandle
GetLocaleInfoW
WideCharToMultiByte
FindResourceExW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
FreeLibrary
LocalFree
IsWow64Process
GetTimeZoneInformation
LoadResource
GetLogicalDriveStringsW
FindClose
SetFileAttributesW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
CopyFileW
GetModuleFileNameW
HeapAlloc
VerSetConditionMask
UnhandledExceptionFilter
LoadLibraryExW
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
GetModuleHandleA
GetFullPathNameW
LockFileEx
GetSystemDefaultUILanguage
MoveFileExW
GetSystemDirectoryW
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
TerminateProcess
SearchPathW
GetModuleHandleExW
SetCurrentDirectoryW
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GlobalLock
GetPrivateProfileIntW
GetProcessHeap
CreateFileMappingW
SetThreadPreferredUILanguages
WriteFile
GetFileSizeEx
ExpandEnvironmentStringsW
FindNextFileW
ResetEvent
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
GetProcAddress
GetPrivateProfileSectionW
CreateEventW
CreateFileW
CreateFileA
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
DosDateTimeToFileTime
GetShortPathNameW
CompareStringW
GetSystemWindowsDirectoryW
GlobalUnlock
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapSize
CopyFileExW
GetCurrentThread
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
UnlockFileEx
GetModuleHandleW
IsValidCodePage
UnmapViewOfFile
FindResourceW
CreateProcessW
Sleep
CreateHardLinkW
Ord(3820)
Ord(6433)
Ord(2438)
Ord(4621)
Ord(2406)
Ord(3000)
Ord(1634)
Ord(1940)
Ord(2980)
Ord(2161)
Ord(5237)
Ord(826)
Ord(4073)
Ord(6153)
Ord(6048)
Ord(5257)
Ord(755)
Ord(3744)
Ord(4470)
Ord(4616)
Ord(6278)
Ord(795)
Ord(4131)
Ord(3257)
Ord(641)
Ord(2506)
Ord(2388)
Ord(3716)
Ord(567)
Ord(3076)
Ord(1633)
Ord(609)
Ord(5285)
Ord(6279)
Ord(6195)
Ord(2859)
Ord(600)
Ord(269)
Ord(5276)
Ord(4401)
Ord(540)
Ord(6466)
Ord(2858)
Ord(5047)
Ord(1767)
Ord(3952)
Ord(3568)
Ord(4229)
Ord(2294)
Ord(5978)
Ord(3087)
Ord(2047)
Ord(1560)
Ord(640)
Ord(3142)
Ord(4282)
Ord(268)
Ord(3792)
Ord(800)
Ord(5157)
Ord(470)
Ord(4221)
Ord(6051)
Ord(5261)
Ord(565)
Ord(3074)
Ord(324)
Ord(3397)
Ord(6193)
Ord(2977)
Ord(2116)
Ord(4418)
Ord(3084)
Ord(2371)
Ord(4831)
Ord(329)
Ord(3196)
Ord(803)
Ord(1808)
Ord(5977)
Ord(1921)
Ord(3614)
Ord(2397)
Ord(1106)
Ord(4992)
Ord(4459)
Ord(3133)
Ord(2377)
Ord(3825)
Ord(4419)
Ord(323)
Ord(4074)
Ord(2640)
Ord(3254)
Ord(1165)
Ord(3341)
Ord(4390)
Ord(4270)
Ord(4118)
Ord(5273)
Ord(543)
Ord(2971)
Ord(4347)
Ord(3579)
Ord(5711)
Ord(5296)
Ord(521)
Ord(1768)
Ord(4704)
Ord(2385)
Ord(3793)
Ord(5871)
Ord(3826)
Ord(1571)
Ord(4847)
Ord(5286)
Ord(1720)
Ord(4075)
Ord(2854)
Ord(3915)
Ord(3949)
Ord(3871)
Ord(1131)
Ord(2637)
Ord(4435)
Ord(5303)
Ord(4693)
Ord(861)
Ord(2820)
Ord(5781)
Ord(5299)
Ord(2078)
Ord(1143)
Ord(3658)
Ord(6372)
Ord(3131)
Ord(817)
Ord(5059)
Ord(6303)
Ord(643)
Ord(6211)
Ord(2855)
Ord(4294)
Ord(4370)
Ord(1787)
Ord(2567)
Ord(3870)
Ord(2634)
Ord(1202)
Ord(4162)
Ord(3621)
Ord(6370)
SysFreeString
UuidCreate
RpcStringFreeW
UuidToStringW
I_RpcMapWin32Status
CommandLineToArgvW
RedrawWindow
GetParent
SystemParametersInfoW
KillTimer
ScreenToClient
GetSystemMetrics
SetWindowLongW
MessageBoxW
GetWindowRect
EnableWindow
CharUpperW
PostMessageW
GetSysColor
GetDC
GetKeyState
SendMessageW
IsWindowVisible
LoadStringW
GetClientRect
DrawTextW
EnableMenuItem
ClientToScreen
InvalidateRect
DrawFocusRect
SetTimer
LoadImageW
PostThreadMessageW
FillRect
CopyRect
GetSysColorBrush
GetNextDlgTabItem
GetSystemMenu
GetFocus
GetWindowLongW
IsChild
CreateEnvironmentBlock
DestroyEnvironmentBlock
IsAppThemed
VerQueryValueW
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
ConstructPartialMsgVW
WdsSetupLogMessageW
CurrentIP
WIMInitFileIOCallbacks
WIMUnmountImage
WIMSetFileIOCallbackTemporaryPath
WTSQueryUserToken
BCryptDestroyHash
BCryptOpenAlgorithmProvider
BCryptHashData
BCryptCreateHash
BCryptFinishHash
BCryptCloseAlgorithmProvider
__p__fmode
_wcmdln
__wgetmainargs
??1type_info@@UAE@XZ
memset
_wcsnicmp
__dllonexit
__RTDynamicCast
towupper
_vsnwprintf
_cexit
?terminate@@YAXXZ
_lock
_onexit
exit
_XcptFilter
__setusermatherr
wcsrchr
towlower
_amsg_exit
_wcsicmp
_unlock
wcschr
__p__commode
__CxxFrameHandler3
_except_handler4_common
wcsncmp
memcpy
memmove
bsearch
wcsstr
_initterm
_exit
_wtoi
_controlfp
__set_app_type
RtlAllocateHeap
NtDuplicateToken
NtSetInformationFile
RtlNtStatusToDosError
RtlFreeHeap
RtlAdjustPrivilege
RtlGetVersion
CoInitializeEx
CoCreateInstance
CoUninitialize
Number of PE resources by type
RT_STRING 207
RT_DIALOG 190
RT_VERSION 38
RT_ICON 26
RT_BITMAP 18
RT_GROUP_ICON 2
RT_RCDATA 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 61
CHINESE SIMPLIFIED 13
KOREAN 13
JAPANESE DEFAULT 13
CHINESE HONGKONG 13
CHINESE TRADITIONAL 13
THAI DEFAULT 13
HEBREW DEFAULT 11
SWEDISH 11
HUNGARIAN DEFAULT 11
ESTONIAN DEFAULT 11
LITHUANIAN 11
FRENCH 11
SLOVENIAN DEFAULT 11
CZECH DEFAULT 11
SPANISH MEXICAN 11
SERBIAN ARABIC YEMEN 11
ITALIAN 11
NORWEGIAN BOKMAL 11
FINNISH DEFAULT 11
PORTUGUESE BRAZILIAN 11
GREEK DEFAULT 11
FRENCH CANADIAN 11
PORTUGUESE 11
TURKISH DEFAULT 11
GERMAN 11
BULGARIAN DEFAULT 11
POLISH DEFAULT 11
DANISH DEFAULT 11
SLOVAK DEFAULT 11
UKRAINIAN DEFAULT 11
LATVIAN DEFAULT 11
SERBIAN DEFAULT 11
ARABIC SAUDI ARABIA 11
SPANISH MODERN 11
ROMANIAN 11
RUSSIAN 11
DUTCH 10
ENGLISH UK 4
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.1

LinkerVersion
14.0

ImageVersion
10.0

FileSubtype
0

FileVersionNumber
10.0.14393.0

UninitializedDataSize
0

LanguageCode
Arabic

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
11002368

EntryPoint
0x2c530

OriginalFileName
SetupPrep.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
10.0.14393.0 (rs1_release.160715-1616)

TimeStamp
2016:07:16 02:33:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
SetupPrep.exe

ProductVersion
10.0.14393.0

FileDescription
Windows 10

OSVersion
10.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
197120

ProductName
Microsoft Windows Operating System

ProductVersionNumber
10.0.14393.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
PE resource-wise parents
Overlay parents
Compressed bundles
File identification
MD5 3d8428bc755a6bd0b7cf7d147b93919f
SHA1 78a5e8da19de4f041da33a4a0a77b56169414626
SHA256 bdeb58009ea32b34676790a34db654eda2827cb2b114fa9b6716986c609e4326
ssdeep
196608:5H5whuqXBbpFhl8W0R4HKUzBW/7Kkhc8BX+JL83VdAZQq8kd:5H5EuqXdL0RwHWD9hvIJOdCh3

authentihash 869b617b1a97f71ca0496e24b7925d02a928329607c2fcd28576f8f5f719840a
imphash c068d894ba11cf2068274141b9b1e20a
File size 17.5 MB ( 18309328 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe overlay signed via-tor

VirusTotal metadata
First submission 2016-08-02 10:21:30 UTC ( 1 year, 6 months ago )
Last submission 2018-01-08 02:22:36 UTC ( 1 month, 2 weeks ago )
File names Media Creation Tool 10.0.14393.exe
MediaCreationTool.exe
2017_03_10_21_06_17.000544
531202
MediaCreationTool Win 10.exe
Windows 10 Media Creation Tool 10.0.14393.0.exe
MediaCreationTool_Build14393_10 - Copy.exe
C_F_9_CF9862F9-3D22-4811-99E7-68CE3327DAE6_MediaCreationTool(1).exe
unconfirmed 111852.crdownload
MediaCreationTool-setup.exe
MediaCreationTool.exe
MediaCreationTool (3).exe
MediaCreationTool win10l.exe
mediacreationtool (6).exe
MediaCreationTool 2.exe
MediaCreationTool.exe
MediaCreationTool.exe
mct.exe
MediaCreationTool.exe
Win10MediaCreationTool.exe
SetupPrep.exe
MediaCreationTool_.exe
160817_MediaCreationTool.exe
WIN MediaCreationTool.exe
Windows 10 ISO Creator.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!