× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: beeb77c09aea334c185d0a5a7cd410da225db467374a183291871bb00c0fb6a0
File name: 763ta2.exe
Detection ratio: 53 / 57
Analysis date: 2017-01-25 06:11:21 UTC ( 2 years, 1 month ago )
Antivirus Result Update
Ad-Aware Trojan.Generic.KD.914347 20170125
AegisLab Troj.W32.Generic!c 20170125
AhnLab-V3 Trojan/Win32.HmBlocker.R64891 20170125
ALYac Trojan.Generic.KD.914347 20170125
Antiy-AVL Worm[Net]/Win32.Kolab 20170125
Arcabit Trojan.Generic.KD.DDF3AB 20170125
Avast Win32:Malware-gen 20170125
AVG Dropper.Generic7.COFM 20170125
Avira (no cloud) TR/Dropper.Gen 20170124
AVware Trojan.Win32.Agent.aaxv (v) 20170125
Baidu Win32.Trojan.Injector.dt 20170125
BitDefender Trojan.Generic.KD.914347 20170125
Bkav W32.KeyloggerLTHVAP.Trojan 20170123
CAT-QuickHeal Trojan.Ircbrute.SU5 20170125
ClamAV Win.Trojan.Agent-1073066 20170125
Comodo TrojWare.Win32.Injector.BGJ 20170125
CrowdStrike Falcon (ML) malicious_confidence_91% (W) 20161024
Cyren W32/Trojan.WLUI-7811 20170125
DrWeb BackDoor.Gurl.2 20170125
Emsisoft Trojan.Generic.KD.914347 (B) 20170125
ESET-NOD32 Win32/Injector.AEJX 20170125
F-Prot W32/Trojan2.NWBR 20170125
F-Secure Trojan.Generic.KD.914347 20170125
Fortinet W32/Injector.AEJX!tr 20170125
GData Trojan.Generic.KD.914347 20170125
Ikarus Trojan.Win32.Ircbrute 20170124
Sophos ML trojan.win32.lethic.b 20170111
Jiangmin Backdoor/Azbreg.aoo 20170125
K7AntiVirus Trojan ( 0040f5791 ) 20170125
K7GW Trojan ( 0040f5791 ) 20170125
Kaspersky HEUR:Trojan.Win32.Generic 20170125
Malwarebytes Worm.AutoRun 20170125
McAfee ObfuscatedAAU!hb!EE2E3E8BB8E2 20170125
McAfee-GW-Edition ObfuscatedAAU!hb!EE2E3E8BB8E2 20170124
Microsoft Trojan:Win32/Lethic.B 20170125
eScan Trojan.Generic.KD.914347 20170125
NANO-Antivirus Trojan.Win32.Gurl.brorzr 20170125
Panda Trj/Zbot.M 20170124
Qihoo-360 HEUR/Malware.QVM07.Gen 20170125
Rising Trojan.Generic-QUdyKEtCzlN (cloud) 20170125
Sophos AV Troj/Agent-AAXV 20170125
SUPERAntiSpyware Trojan.Agent/Gen-Undef 20170125
Symantec Packed.Generic.326 20170125
Tencent Win32.Trojan.Generic.Alis 20170125
TheHacker Trojan/Injector.aejx 20170125
TotalDefense Win32/Lethic.THCJaN 20170125
TrendMicro TROJ_LETHIC.OU 20170125
TrendMicro-HouseCall TROJ_SPNR.14IN13 20170125
VBA32 BScope.Backdoor.IRCBot.2122 20170124
VIPRE Trojan.Win32.Agent.aaxv (v) 20170125
ViRobot Worm.Win32.Net-Kolab.68231[h] 20170125
Yandex Trojan.Injector!XWZZ9oRWCPQ 20170124
Zoner Trojan.Lethic.AA 20170125
Alibaba 20170122
CMC 20170125
Kingsoft 20170125
nProtect 20170125
Trustlook 20170125
WhiteArmor 20170123
Zillya 20170125
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-10-28 19:00:30
Entry Point 0x0000160F
Number of sections 5
PE sections
Overlays
MD5 1bbdb400783d6f6533ce14b2184e5b3f
File type ASCII text
Offset 40960
Size 2530
Entropy 0.00
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
AddAtomA
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetStartupInfoA
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
GetTickCount
TlsSetValue
HeapAlloc
GetVersion
VirtualAlloc
SetLastError
LeaveCriticalSection
DrawAnimatedRects
FlashWindowEx
Number of PE resources by type
Struct(202) 1
Struct(211) 1
Number of PE resources by language
GERMAN NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:10:28 20:00:30+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
16384

SubsystemVersion
4.0

EntryPoint
0x160f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 ee2e3e8bb8e219af866fafb6318de001
SHA1 9757f5ad5ff19cd80e81f653100a6245b24aa090
SHA256 beeb77c09aea334c185d0a5a7cd410da225db467374a183291871bb00c0fb6a0
ssdeep
384:rpcTPJTRb47dEbmltqyA6FVvQQVU+oE3lI4v+ojFSP0fYD8wV:rCbJTWdEDgbvXF3lNEdrV

authentihash 03854f0b19fcdf280fbfbffb02b6542dbb26f81343b2b58986b056f047a3f158
imphash b41f22486d4aa79695588232cb2c7b00
File size 42.5 KB ( 43490 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (56.7%)
Win32 Executable MS Visual C++ (generic) (29.1%)
Win32 Dynamic Link Library (generic) (6.1%)
Win32 Executable (generic) (4.2%)
Generic Win/DOS Executable (1.8%)
Tags
peexe armadillo usb-autorun overlay

VirusTotal metadata
First submission 2013-09-16 21:58:41 UTC ( 5 years, 6 months ago )
Last submission 2016-04-03 22:11:08 UTC ( 2 years, 11 months ago )
File names bc08.exe
763ta2.exe
p18w7.exe
7e68.exe
file-5984985_
763ta2.exe
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs