× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c9de4f2566e58f6ba63a198c08b10f9a7deae0a766178d8c6a6e049d970f1132
File name: sswwwi.exe
Detection ratio: 0 / 71
Analysis date: 2019-01-09 14:28:06 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis 20181227
Ad-Aware 20190109
AegisLab 20190109
AhnLab-V3 20190109
Alibaba 20180921
ALYac 20190109
Antiy-AVL 20190109
Arcabit 20190109
Avast 20190109
Avast-Mobile 20190109
AVG 20190109
Avira (no cloud) 20190109
Babable 20180918
Baidu 20190109
BitDefender 20190109
Bkav 20190108
CAT-QuickHeal 20190109
ClamAV 20190109
CMC 20190109
Comodo 20190109
CrowdStrike Falcon (ML) 20181022
Cybereason 20190109
Cylance 20190109
Cyren 20190109
DrWeb 20190109
eGambit 20190109
Emsisoft 20190109
Endgame 20181108
ESET-NOD32 20190109
F-Prot 20190109
F-Secure 20190109
Fortinet 20190109
GData 20190109
Ikarus 20190109
Sophos ML 20181128
Jiangmin 20190109
K7AntiVirus 20190109
K7GW 20190109
Kaspersky 20190109
Kingsoft 20190109
Malwarebytes 20190109
MAX 20190109
McAfee 20190109
McAfee-GW-Edition 20190109
Microsoft 20190109
eScan 20190109
NANO-Antivirus 20190109
Palo Alto Networks (Known Signatures) 20190109
Panda 20190109
Qihoo-360 20190109
Rising 20190109
SentinelOne (Static ML) 20181223
Sophos AV 20190109
SUPERAntiSpyware 20190102
Symantec 20190109
TACHYON 20190109
Tencent 20190109
TheHacker 20190106
TotalDefense 20190109
Trapmine 20190103
TrendMicro 20190109
TrendMicro-HouseCall 20190109
Trustlook 20190109
VBA32 20190109
VIPRE 20190109
ViRobot 20190109
Webroot 20190109
Yandex 20181229
Zillya 20190109
ZoneAlarm by Check Point 20190109
Zoner 20190109
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
AnalogX, LLC. All rights reserved.

Product SimpleServer:WWW Installer
Original name sswwwi.exe
Description AnalogX SimpleServer:WWW Installer
Signature verification Signed file, verified signature
Signing date 5:20 PM 5/23/2009
Signers
[+] AnalogX, LLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Go Daddy Secure Certification Authority
Valid from 05:07 PM 05/21/2009
Valid to 03:58 PM 05/21/2010
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 11CD73F5EE4BDD37E241EE5C9055011498C82AFD
Serial number 00 AE 55 A5 F8 0E E0
[+] Go Daddy Secure Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 01:54 AM 11/16/2006
Valid to 01:54 AM 11/16/2026
Valid usage All
Algorithm sha1RSA
Thumbprint 7C4656C3061F7F4C0D67B319A855F60EBC11FC44
Serial number 03 01
[+] Go Daddy Class 2 Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 04:06 PM 06/29/2004
Valid to 04:06 PM 06/29/2034
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 2796BAE63F1801E277261BA0D77770028F20EEE4
Serial number 00
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 11:00 PM 06/14/2007
Valid to 10:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/04/2003
Valid to 11:59 PM 12/03/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-05-24 01:13:39
Entry Point 0x00012357
Number of sections 4
PE sections
Overlays
MD5 dfb38339818d9295c1ef302f505f6aef
File type data
Offset 158208
Size 237920
Entropy 7.99
PE imports
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
InitCommonControlsEx
AddFontResourceA
DeleteDC
RemoveFontResourceA
SelectObject
BitBlt
GdiFlush
CreateDIBSection
CreateCompatibleDC
DeleteObject
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
AllocConsole
TlsGetValue
SetLastError
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
FindClose
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
SetUnhandledExceptionFilter
GetCurrentProcess
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetProcAddress
GetProcessHeap
CompareStringW
FindFirstFileA
CompareStringA
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetConsoleTitleA
CloseHandle
GetACP
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
EnumWindows
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetSysColorBrush
GetSystemMetrics
IsWindow
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
GetUpdateRect
ShowWindowAsync
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
RegisterClassExA
SetWindowTextA
DestroyIcon
SendDlgItemMessageA
SendMessageA
GetWindowTextA
GetClientRect
GetDlgItem
CreateDialogParamA
InvalidateRect
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
GetDesktopWindow
GetClassNameA
SetForegroundWindow
UnregisterClassA
DestroyWindow
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 5
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
34816

ImageVersion
0.0

ProductName
SimpleServer:WWW Installer

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
sswwwi.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
2009:05:23 18:13:39-07:00

FileType
Win32 EXE

PEType
PE32

FileDescription
AnalogX SimpleServer:WWW Installer

OSVersion
4.0

FileOS
Win32

LegalCopyright
AnalogX, LLC. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
AnalogX, LLC

CodeSize
122368

FileSubtype
0

ProductVersionNumber
0.0.0.0

EntryPoint
0x12357

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Execution parents
Compressed bundles
File identification
MD5 e9fe0f0335b58d398c19e902049b511a
SHA1 c01026570e52d9ca79fbce17044f31568eed6b04
SHA256 c9de4f2566e58f6ba63a198c08b10f9a7deae0a766178d8c6a6e049d970f1132
ssdeep
6144:aefdDoDLhnowxc2yDvJQTe0jp0jQ9p6c789BuhYdes2lQ9T6T+vJvS4Os1:zRoDLvO2yD+zpd8L7ZGKw4D

authentihash 57e3f95011a84cc0e471a1f51c85799a0bbc74af86042c9cb53e6bb57900176c
imphash 56ed6084c5ecd8784553be57502cda76
File size 386.8 KB ( 396128 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2009-08-31 13:09:43 UTC ( 9 years, 5 months ago )
Last submission 2018-11-27 15:42:34 UTC ( 2 months, 3 weeks ago )
File names sswwwi.exe
file-4439224_exe
analogx-simpleserverwww.exe
C9DE4F2566E58F6BA63A198C08B10F9A7DEAE0A766178D8C6A6E049D970F1132
sswwwi.exe
analogx-simpleserverwww.exe
sswwwi.exe
analogx-simpleserver-www_1-24_en_10527.exe
sswwwi.exe
122251
SERVIDOR_OTIMO_SIMPLES_sswwwi.exe
SSvr.exe
c9de4f2566e58f6ba63a198c08b10f9a7deae0a766178d8c6a6e049d970f1132
sswwwi.exe
data
sswwwi.exe
1340476219-sswwwi.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!