× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c402009e45fde264a52f88e7856b1a7fbff4239a2d4fc59d73fb0282c7a62605
File name: Adobe-Illustrator.exe
Detection ratio: 0 / 53
Analysis date: 2015-12-16 21:55:26 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware 20151216
AegisLab 20151216
Yandex 20151214
AhnLab-V3 20151216
Alibaba 20151208
Antiy-AVL 20151216
Arcabit 20151216
Avast 20151216
AVG 20151216
Avira (no cloud) 20151216
AVware 20151216
Baidu-International 20151216
BitDefender 20151216
Bkav 20151215
ByteHero 20151216
CAT-QuickHeal 20151216
ClamAV 20151216
CMC 20151216
Comodo 20151216
Cyren 20151216
DrWeb 20151216
Emsisoft 20151216
ESET-NOD32 20151216
F-Prot 20151216
F-Secure 20151216
Fortinet 20151216
GData 20151216
Ikarus 20151216
Jiangmin 20151216
K7AntiVirus 20151216
K7GW 20151216
Kaspersky 20151216
Malwarebytes 20151216
McAfee 20151216
McAfee-GW-Edition 20151216
Microsoft 20151216
eScan 20151216
NANO-Antivirus 20151216
nProtect 20151216
Panda 20151215
Qihoo-360 20151216
Rising 20151216
SUPERAntiSpyware 20151216
Symantec 20151216
TheHacker 20151215
TotalDefense 20151216
TrendMicro 20151216
TrendMicro-HouseCall 20151216
VBA32 20151216
VIPRE 20151216
ViRobot 20151216
Zillya 20151216
Zoner 20151216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 2013 Adobe Systems Incorporated. All rights reserved.

Publisher Adobe Systems Incorporated
Product Creative Cloud
Original name Creative Cloud.exe
Internal name Creative Cloud
File version 2.3.0.322
Description Creative Cloud Set-Up
Signature verification Signed file, verified signature
Signing date 9:40 AM 12/19/2013
Signers
[+] Adobe Systems Incorporated
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 2/19/2013
Valid to 12:59 AM 2/21/2014
Valid usage Code Signing
Algorithm SHA1
Thumbprint 5806BFBAC832E75D553F3C8706BCDDB0989FA9EB
Serial number 11 C9 54 AE 24 12 01 1C F5 4A 7C 3C B1 8D 75 1E
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer None
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer None
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer None
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer None
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer None
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-12-18 22:16:14
Entry Point 0x000CE640
Number of sections 5
PE sections
Overlays
MD5 04c4addd427c95eaf3a22f33459942e5
File type data
Offset 2838016
Size 6520
Entropy 7.29
PE imports
SetSecurityDescriptorDacl
SetEntriesInAclW
CryptReleaseContext
RegCloseKey
GetUserNameW
FreeSid
CryptGetHashParam
RegQueryValueExA
RegOpenKeyExW
InitializeSecurityDescriptor
CryptAcquireContextW
AllocateAndInitializeSid
CryptHashData
CryptDestroyHash
CryptCreateHash
GetDeviceCaps
GetStdHandle
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
IsDBCSLeadByteEx
GetTempPathA
WideCharToMultiByte
GetDiskFreeSpaceW
InterlockedExchange
WriteFile
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
ConnectNamedPipe
GetFullPathNameA
SetEvent
LocalFree
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
InterlockedDecrement
FormatMessageA
GetFullPathNameW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
RemoveDirectoryW
IsDebuggerPresent
ExitProcess
HeapSetInformation
EnumSystemLocalesA
EnumSystemLocalesW
TlsGetValue
MultiByteToWideChar
SetFilePointerEx
MoveFileW
SetFileAttributesW
LockFileEx
CreateThread
CreateSemaphoreW
CreateMutexW
IsProcessorFeaturePresent
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SetUnhandledExceptionFilter
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
UnlockFile
GetFileSize
DeleteFileA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTimeFormatW
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
FindFirstFileW
IsValidLocale
WaitForMultipleObjects
GetUserDefaultLCID
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
CreateNamedPipeW
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
HeapReAlloc
CompareStringW
GetEnvironmentStringsW
LockFile
lstrlenW
SizeofResource
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
InterlockedCompareExchange
RaiseException
ReleaseSemaphore
TlsFree
SetFilePointer
ReadFile
CloseHandle
OpenMutexW
SetDllDirectoryW
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
GetTempPathW
CreateProcessW
Sleep
OpenSemaphoreW
GetOEMCP
VariantChangeType
SysStringLen
VariantClear
SysAllocString
VariantCopy
GetErrorInfo
SysFreeString
SysAllocStringByteLen
VariantInit
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
CM_Get_DevNode_Status
SHGetFolderLocation
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteW
SHGetPathFromIDListW
ShellExecuteExW
SHGetSpecialFolderPathW
Ord(680)
CommandLineToArgvW
PathRenameExtensionW
PathIsFileSpecW
PathStripPathW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
PathIsNetworkPathW
PathAppendW
PathAddExtensionW
PathIsDirectoryW
PathRemoveExtensionW
EndDialog
GetMessageW
ShowWindow
SetWindowPos
MessageBoxW
EnableWindow
DialogBoxParamW
TranslateMessage
GetDlgItemTextW
PostMessageW
DispatchMessageW
ReleaseDC
SendMessageW
SendDlgItemMessageW
SetWindowTextW
GetDlgItem
EnableMenuItem
LoadImageW
GetSystemMenu
GetWindowTextLengthW
GetDC
LoadAcceleratorsW
wsprintfW
TranslateAcceleratorW
WinHttpSetOption
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetTimeouts
WinHttpQueryDataAvailable
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpGetProxyForUrl
WinHttpAddRequestHeaders
WinHttpSetStatusCallback
WinHttpQueryAuthSchemes
WinHttpReceiveResponse
WinHttpOpen
WinHttpOpenRequest
WinHttpSendRequest
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeSecurity
CLSIDFromProgID
CLSIDFromString
OleRun
CoTaskMemFree
StringFromGUID2
CoSetProxyBlanket
Number of PE resources by type
ZSTRINGTABLE 31
RT_ICON 10
RT_DIALOG 3
RT_GROUP_ICON 2
RT_ACCELERATOR 1
RT_VERSION 1
RT_MANIFEST 1
SYSTEM_CHECK 1
RT_STRING 1
RT_MENU 1
PRODUCT_INFO 1
CREATIVECLOUDHELPER 1
Number of PE resources by language
ENGLISH US 47
ENGLISH ARABIC QATAR 7
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.3.0.322

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
1811968

EntryPoint
0xce640

OriginalFileName
Creative Cloud.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2013 Adobe Systems Incorporated. All rights reserved.

FileVersion
2.3.0.322

TimeStamp
2013:12:18 23:16:14+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Creative Cloud

ProductVersion
2.3.0.322

FileDescription
Creative Cloud Set-Up

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Adobe Systems Incorporated

CodeSize
1025024

ProductName
Creative Cloud

ProductVersionNumber
2.3.0.322

FileTypeExtension
exe

ObjectFileType
Dynamic link library

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Compressed bundles
File identification
MD5 ad58b986b1fd5589f8df8969eedf4440
SHA1 2a4b0ddfca7b81e042e12ed15e258fcbbe8a0338
SHA256 c402009e45fde264a52f88e7856b1a7fbff4239a2d4fc59d73fb0282c7a62605
ssdeep
49152:GQYXBWVgfcU5xO6x+VgPze1oTjbDh+DUnNX:xmWVgfcAxObVgPzj+2NX

authentihash a1e05be240d7ce39a95517bf37153522d286336e1ebe1d5d9ed5735eedb0b0d3
imphash 4305f056bb69cb6dcac73ae258e7d04c
File size 2.7 MB ( 2844536 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.4%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2014-01-02 04:15:01 UTC ( 4 years, 9 months ago )
Last submission 2014-05-20 11:11:06 UTC ( 4 years, 5 months ago )
File names CreativeCloudSet-Up.exe
Creative Cloud.exe
AD58B986B1FD5589F8DF8969EEDF4440
Creative Cloud
Adobe-Illustrator.exe
creativecloudset-up.exe
CreativeCloudSet-Up.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications