Windows
Analysis Report
CH341SER.EXE
Overview
General Information
Detection
Score: | 29 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Signatures
Classification
Analysis Advice
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook |
Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior |
- System is w10x64_ra
CH341SER.EXE (PID: 4540 cmdline:
C:\Users\u ser\Deskto p\CH341SER .EXE MD5: 1AF3FDEBFBAB3E247FEB588AEA64DD64) SETUP.EXE (PID: 3304 cmdline:
"C:\WCH.CN \CH341SER\ SETUP.EXE" MD5: 181F68547D52360FC142AC3ADC2436B7) DRVSETUP64.exe (PID: 6476 cmdline:
C:\WCH.CN\ CH341SER\D RVSETUP64\ DRVSETUP64 .EXE MD5: 1FE688688C2082B37827DB54C4282AF0)
drvinst.exe (PID: 2200 cmdline:
DrvInst.ex e "4" "0" "C:\Users\ user\AppDa ta\Local\T emp\{75f2d e58-5fbd-2 644-94ef-2 bf0ceab99a 3}\CH341SE R.INF" "9" "4dbd0d02 f" "000000 0000000168 " "WinSta0 \Default" "000000000 000014C" " 208" "C:\W CH.CN\CH34 1SER" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
- cleanup
- • Compliance
- • Networking
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Dropped File: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Window detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File created: | Jump to behavior |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Windows Service | 1 Windows Service | 4 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | 1 LSASS Driver | 1 LSASS Driver | 1 Software Packing | LSASS Memory | 1 Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | 11 Process Injection | 11 Process Injection | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 1 File Deletion | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | Protocol Impersonation | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1358850 |
Start date and time: | 2023-12-11 19:37:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | CH341SER.EXE |
Detection: | SUS |
Classification: | sus29.winEXE@6/39@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WMIADAP.exe, SIHCl ient.exe, SgrmBroker.exe, MoUs oCoreWorker.exe, conhost.exe, svchost.exe - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , ctldl.windowsupdate.com, fe3 cr.delivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtDeviceIoControlFile calls found. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: CH341S
ER.EXE
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\{75f2de58-5fbd-2644-94ef-2bf0ceab99a3}\SET8A49.tmp | Get hash | malicious | Browse | |||
C:\WCH.CN\CH341SER\CH341S64.SYS | Get hash | malicious | Browse | |||
C:\WCH.CN\CH341SER\CH341PT.DLL | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Browse |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10466 |
Entropy (8bit): | 6.923809869295835 |
Encrypted: | false |
SSDEEP: | 192:enOTMcTZwTT4YTQ0T/TZyqeEymwscpH2vByQlT3G/R8X09+3Ef5KYpBjSA0p2:hVZydrLUH2pzx2KXM+3Ef5dpBjh62 |
MD5: | 715693624013826D337E792ED86376AC |
SHA1: | A3AA17C2BAE326ECBD19B4969FD36724299D5ABD |
SHA-256: | 585FCA8AB9C8A13222760D6BBAB62CE4069D24F73BD304D89C54B5298B9420BD |
SHA-512: | 47E60A905B0F966DB61688C98CF16005862B5BCE61A47B4C72B090E414D7B0C8EEBA94795BBF100272AE6B1D0A843142902E852D610A528C2629F35E3F59E46F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10466 |
Entropy (8bit): | 6.923809869295835 |
Encrypted: | false |
SSDEEP: | 192:enOTMcTZwTT4YTQ0T/TZyqeEymwscpH2vByQlT3G/R8X09+3Ef5KYpBjSA0p2:hVZydrLUH2pzx2KXM+3Ef5dpBjh62 |
MD5: | 715693624013826D337E792ED86376AC |
SHA1: | A3AA17C2BAE326ECBD19B4969FD36724299D5ABD |
SHA-256: | 585FCA8AB9C8A13222760D6BBAB62CE4069D24F73BD304D89C54B5298B9420BD |
SHA-512: | 47E60A905B0F966DB61688C98CF16005862B5BCE61A47B4C72B090E414D7B0C8EEBA94795BBF100272AE6B1D0A843142902E852D610A528C2629F35E3F59E46F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6678 |
Entropy (8bit): | 5.864044927333677 |
Encrypted: | false |
SSDEEP: | 192:VyiC/xM4geO5ZafiWPty4HhGlFuD4JSXQYQLhQ66Auy:ZC/xM4geO5bY1HhuFuDISXQYQLhQ66fy |
MD5: | 0ECFFBA87B80F54F7016DA633DD9AB1C |
SHA1: | E46668F0267651C248944766291791B0DEF36F1D |
SHA-256: | 0CBD34F89B0D11B386E07A825FAB531706F86E9DA44DCC536AC7C98A6D22C383 |
SHA-512: | 1738BD22BE834B053CABE91F2F53A2686D2091B29CB3CABA9FD3033FB94108AD2DB42829EDC25F38DAE22BF46AC9BCE2CB5919CBF0B63C88BF7D7B22B2B2CA2D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59904 |
Entropy (8bit): | 5.92773729833597 |
Encrypted: | false |
SSDEEP: | 768:Di+r3IRgvQFTOlBg7L2RzlKx3CDjUKZeUSgqg0ACdLgLRHT31mlGdJeB:DvXvQclBgmRzu3wIEefACdsLRH7c5 |
MD5: | 3C0A1B6F538E00F318C109F4A3F29515 |
SHA1: | 8F337186BFDBFF75B11EB510E47C96479FC2327A |
SHA-256: | DE6CA1AE927081AC622F99AB9C77B2127CBB2DF597B4123A4AA2F3DA52CD64D5 |
SHA-512: | 1DB105044C6D6A9C671CB730E4A49982D3146DB54E51D6DEC34834144428CDCCD333E3980B4B92EEB3A0CE993EA2B773B47399155EBEB99363BA02B27B166ED8 |
Malicious: | false |
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Joe Sandbox View: | |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 59904 |
Entropy (8bit): | 5.92773729833597 |
Encrypted: | false |
SSDEEP: | 768:Di+r3IRgvQFTOlBg7L2RzlKx3CDjUKZeUSgqg0ACdLgLRHT31mlGdJeB:DvXvQclBgmRzu3wIEefACdsLRH7c5 |
MD5: | 3C0A1B6F538E00F318C109F4A3F29515 |
SHA1: | 8F337186BFDBFF75B11EB510E47C96479FC2327A |
SHA-256: | DE6CA1AE927081AC622F99AB9C77B2127CBB2DF597B4123A4AA2F3DA52CD64D5 |
SHA-512: | 1DB105044C6D6A9C671CB730E4A49982D3146DB54E51D6DEC34834144428CDCCD333E3980B4B92EEB3A0CE993EA2B773B47399155EBEB99363BA02B27B166ED8 |
Malicious: | true |
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 19680 |
Entropy (8bit): | 6.177213515531636 |
Encrypted: | false |
SSDEEP: | 384:3P2ie5TwxdKe9Vk5DT6Im2ULzQFAQOCsznlUt+3x:OiesSVTZm2ULz4A27wx |
MD5: | B6F4A83911336E84BEAD8F8905285FAB |
SHA1: | 983786502F45AFB946F023D73E32A31BC1BBB91D |
SHA-256: | 0ECD1222627271EA31D3B64796992B6DAF5133D64CC26D43B3873CBE32FD59CB |
SHA-512: | 93E949EA7CF067E1CEC52F6DDE8678FC7BCEB2E947164040A087FDD63E799CC244EB6974323FC836F70AE777A67E9660F4E9E2DBB42DC0C4B099B1C2BE168964 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 6678 |
Entropy (8bit): | 5.864044927333677 |
Encrypted: | false |
SSDEEP: | 192:VyiC/xM4geO5ZafiWPty4HhGlFuD4JSXQYQLhQ66Auy:ZC/xM4geO5bY1HhuFuDISXQYQLhQ66fy |
MD5: | 0ECFFBA87B80F54F7016DA633DD9AB1C |
SHA1: | E46668F0267651C248944766291791B0DEF36F1D |
SHA-256: | 0CBD34F89B0D11B386E07A825FAB531706F86E9DA44DCC536AC7C98A6D22C383 |
SHA-512: | 1738BD22BE834B053CABE91F2F53A2686D2091B29CB3CABA9FD3033FB94108AD2DB42829EDC25F38DAE22BF46AC9BCE2CB5919CBF0B63C88BF7D7B22B2B2CA2D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20089 |
Entropy (8bit): | 5.450760869632819 |
Encrypted: | false |
SSDEEP: | 384:GzXpHVPakjq16uZuDxqLOvCxXEAjT90DVBAMBTaU:05Hr+EGlXbT9uAQGU |
MD5: | BE7438420F1DA854917F58CAD557476D |
SHA1: | CAF1095963459AB66326CDC7ECAB29514938748F |
SHA-256: | 2A946F316EDD7E1185DEEAFDC2DE52B2D2843198BE098A724233C12F9CCD0DAE |
SHA-512: | E35442704374A3B5E79BAD491F819AC82CE3054ED50AE1EEF0FC3ACBB6D3016BDBCDD63902236E247CB4B8279FF8FEC377AFA2753EBDBCA911D6D388D23A63DB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 47040 |
Entropy (8bit): | 6.257045960783428 |
Encrypted: | false |
SSDEEP: | 768:Km0g8/JV5NDAGcN37MpHdMon5f/D1yM4E9obXDC8TvmS+geyX8K:7ydNUG1as5DerDJmS+aX8K |
MD5: | 1FE688688C2082B37827DB54C4282AF0 |
SHA1: | D6DC4F97A61A9F1919CBBD7CC52C7BB59B0291FB |
SHA-256: | A5A07EE7B5195497BE4796845CB05B38618DAAF2AF98884B29EEAD6D073353B8 |
SHA-512: | 5D2A93EA1C47F1D9623CDDF57F4F7961C9B78258BDEEEC5CB62A461853BE6B7B47C20617DE300366E60BB4146B6A283A8CA7694FEE3EE8AFB90E72875841272B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 100288 |
Entropy (8bit): | 5.70137381151815 |
Encrypted: | false |
SSDEEP: | 1536:kkemXlWr2vWvTSQUbnShitoodAO7i9eoneAGXH:kkbv9fUILAOOUoneAiH |
MD5: | 181F68547D52360FC142AC3ADC2436B7 |
SHA1: | 8D5EAC850374E4FAF2BAC2E439D1E02D2D2C704B |
SHA-256: | A8F306D5BA1A23F587283FD410313F50AC1AC5CE1268938B065130A0DC84C658 |
SHA-512: | 1EE8FDB1692061482A0FCC6030ECE500FA7473586FFFE6EB3836B3D3D54BED4CB4FE443DE8173D252E5D206EABEE6E363C387366B159AE29859C77BBFE5CEE4E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CH341SER.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10466 |
Entropy (8bit): | 6.923809869295835 |
Encrypted: | false |
SSDEEP: | 192:enOTMcTZwTT4YTQ0T/TZyqeEymwscpH2vByQlT3G/R8X09+3Ef5KYpBjSA0p2:hVZydrLUH2pzx2KXM+3Ef5dpBjh62 |
MD5: | 715693624013826D337E792ED86376AC |
SHA1: | A3AA17C2BAE326ECBD19B4969FD36724299D5ABD |
SHA-256: | 585FCA8AB9C8A13222760D6BBAB62CE4069D24F73BD304D89C54B5298B9420BD |
SHA-512: | 47E60A905B0F966DB61688C98CF16005862B5BCE61A47B4C72B090E414D7B0C8EEBA94795BBF100272AE6B1D0A843142902E852D610A528C2629F35E3F59E46F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\drvinst.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6678 |
Entropy (8bit): | 5.864044927333677 |
Encrypted: | false |
SSDEEP: | 192:VyiC/xM4geO5ZafiWPty4HhGlFuD4JSXQYQLhQ66Auy:ZC/xM4geO5bY1HhuFuDISXQYQLhQ66fy |
MD5: | 0ECFFBA87B80F54F7016DA633DD9AB1C |
SHA1: | E46668F0267651C248944766291791B0DEF36F1D |
SHA-256: | 0CBD34F89B0D11B386E07A825FAB531706F86E9DA44DCC536AC7C98A6D22C383 |
SHA-512: | 1738BD22BE834B053CABE91F2F53A2686D2091B29CB3CABA9FD3033FB94108AD2DB42829EDC25F38DAE22BF46AC9BCE2CB5919CBF0B63C88BF7D7B22B2B2CA2D |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2499971 |
Entropy (8bit): | 5.22097471360513 |
Encrypted: | false |
SSDEEP: | 12288:O+5cge9m9jVuWs22GZRvV3V6hcGZ0s2NZL:sGZRqcGZe |
MD5: | E0F076664C75CF35C219C19A3391736E |
SHA1: | C67B143C8E1C3C2BDA23F90BFD9533AEAC79BEF4 |
SHA-256: | 342B93F4DD00C5022CF1D6BF515AF978506BC1B9C2066EC346337050C325ADC8 |
SHA-512: | 4EB2F88B1D021BB3213C69B16AC92F81D4AB729485333EEE15C3A084738BD5685091F90C6230D089CA01FDD25C32A81ABBEDAD533491BE2DD78AE3B80DF7832A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\drvinst.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10466 |
Entropy (8bit): | 6.923809869295835 |
Encrypted: | false |
SSDEEP: | 192:enOTMcTZwTT4YTQ0T/TZyqeEymwscpH2vByQlT3G/R8X09+3Ef5KYpBjSA0p2:hVZydrLUH2pzx2KXM+3Ef5dpBjh62 |
MD5: | 715693624013826D337E792ED86376AC |
SHA1: | A3AA17C2BAE326ECBD19B4969FD36724299D5ABD |
SHA-256: | 585FCA8AB9C8A13222760D6BBAB62CE4069D24F73BD304D89C54B5298B9420BD |
SHA-512: | 47E60A905B0F966DB61688C98CF16005862B5BCE61A47B4C72B090E414D7B0C8EEBA94795BBF100272AE6B1D0A843142902E852D610A528C2629F35E3F59E46F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\drvinst.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6678 |
Entropy (8bit): | 5.864044927333677 |
Encrypted: | false |
SSDEEP: | 192:VyiC/xM4geO5ZafiWPty4HhGlFuD4JSXQYQLhQ66Auy:ZC/xM4geO5bY1HhuFuDISXQYQLhQ66fy |
MD5: | 0ECFFBA87B80F54F7016DA633DD9AB1C |
SHA1: | E46668F0267651C248944766291791B0DEF36F1D |
SHA-256: | 0CBD34F89B0D11B386E07A825FAB531706F86E9DA44DCC536AC7C98A6D22C383 |
SHA-512: | 1738BD22BE834B053CABE91F2F53A2686D2091B29CB3CABA9FD3033FB94108AD2DB42829EDC25F38DAE22BF46AC9BCE2CB5919CBF0B63C88BF7D7B22B2B2CA2D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\drvinst.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59904 |
Entropy (8bit): | 5.92773729833597 |
Encrypted: | false |
SSDEEP: | 768:Di+r3IRgvQFTOlBg7L2RzlKx3CDjUKZeUSgqg0ACdLgLRHT31mlGdJeB:DvXvQclBgmRzu3wIEefACdsLRH7c5 |
MD5: | 3C0A1B6F538E00F318C109F4A3F29515 |
SHA1: | 8F337186BFDBFF75B11EB510E47C96479FC2327A |
SHA-256: | DE6CA1AE927081AC622F99AB9C77B2127CBB2DF597B4123A4AA2F3DA52CD64D5 |
SHA-512: | 1DB105044C6D6A9C671CB730E4A49982D3146DB54E51D6DEC34834144428CDCCD333E3980B4B92EEB3A0CE993EA2B773B47399155EBEB99363BA02B27B166ED8 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20089 |
Entropy (8bit): | 5.450760869632819 |
Encrypted: | false |
SSDEEP: | 384:GzXpHVPakjq16uZuDxqLOvCxXEAjT90DVBAMBTaU:05Hr+EGlXbT9uAQGU |
MD5: | BE7438420F1DA854917F58CAD557476D |
SHA1: | CAF1095963459AB66326CDC7ECAB29514938748F |
SHA-256: | 2A946F316EDD7E1185DEEAFDC2DE52B2D2843198BE098A724233C12F9CCD0DAE |
SHA-512: | E35442704374A3B5E79BAD491F819AC82CE3054ED50AE1EEF0FC3ACBB6D3016BDBCDD63902236E247CB4B8279FF8FEC377AFA2753EBDBCA911D6D388D23A63DB |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20089 |
Entropy (8bit): | 5.450760869632819 |
Encrypted: | false |
SSDEEP: | 384:GzXpHVPakjq16uZuDxqLOvCxXEAjT90DVBAMBTaU:05Hr+EGlXbT9uAQGU |
MD5: | BE7438420F1DA854917F58CAD557476D |
SHA1: | CAF1095963459AB66326CDC7ECAB29514938748F |
SHA-256: | 2A946F316EDD7E1185DEEAFDC2DE52B2D2843198BE098A724233C12F9CCD0DAE |
SHA-512: | E35442704374A3B5E79BAD491F819AC82CE3054ED50AE1EEF0FC3ACBB6D3016BDBCDD63902236E247CB4B8279FF8FEC377AFA2753EBDBCA911D6D388D23A63DB |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\drvinst.exe |
File Type: | |
Category: | modified |
Size (bytes): | 74025 |
Entropy (8bit): | 5.389839095690089 |
Encrypted: | false |
SSDEEP: | 1536:9btHoTB7cIxsw9pmDNHSJrR459D0w/smToijZQB4XKdJEBbWwSYcoMwVU5KaOsNv:9m |
MD5: | 10AFC0F46DFBE20179C535FC8AC7CFF2 |
SHA1: | 5FF59972B66E327F3048B29ED47184B2D77BE94F |
SHA-256: | 2D7FA4779187CF8850C259456B52DC41334B62B64C336ECD3717A047BBCADADD |
SHA-512: | CB8114E8C1BD734E743BA027F07643D3F759F7DB562A3846233AAFDF83619AADC96B2E50C1D900B9FCA956D12D845B0D46D0D36511AF26F7178DADCA5958050F |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19680 |
Entropy (8bit): | 6.177213515531636 |
Encrypted: | false |
SSDEEP: | 384:3P2ie5TwxdKe9Vk5DT6Im2ULzQFAQOCsznlUt+3x:OiesSVTZm2ULz4A27wx |
MD5: | B6F4A83911336E84BEAD8F8905285FAB |
SHA1: | 983786502F45AFB946F023D73E32A31BC1BBB91D |
SHA-256: | 0ECD1222627271EA31D3B64796992B6DAF5133D64CC26D43B3873CBE32FD59CB |
SHA-512: | 93E949EA7CF067E1CEC52F6DDE8678FC7BCEB2E947164040A087FDD63E799CC244EB6974323FC836F70AE777A67E9660F4E9E2DBB42DC0C4B099B1C2BE168964 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19680 |
Entropy (8bit): | 6.177213515531636 |
Encrypted: | false |
SSDEEP: | 384:3P2ie5TwxdKe9Vk5DT6Im2ULzQFAQOCsznlUt+3x:OiesSVTZm2ULz4A27wx |
MD5: | B6F4A83911336E84BEAD8F8905285FAB |
SHA1: | 983786502F45AFB946F023D73E32A31BC1BBB91D |
SHA-256: | 0ECD1222627271EA31D3B64796992B6DAF5133D64CC26D43B3873CBE32FD59CB |
SHA-512: | 93E949EA7CF067E1CEC52F6DDE8678FC7BCEB2E947164040A087FDD63E799CC244EB6974323FC836F70AE777A67E9660F4E9E2DBB42DC0C4B099B1C2BE168964 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41472 |
Entropy (8bit): | 6.24815654617757 |
Encrypted: | false |
SSDEEP: | 768:BUkA6vcfLLJQ0y0Apg++LVhf3/CsItc5muLuyJGN:q4uJQ70Apg++LLfvbJAeulN |
MD5: | A9FC675D0029A525335B106487C7D578 |
SHA1: | 0D8B829640DC907EE9B2E6DB1C43F8459D63E2E2 |
SHA-256: | 50877BC8EA82BBAC833D25C9AC248E6FC9A240AB3C6D7E2C115667532C23676F |
SHA-512: | 8CF58435D597452A9D34E02E23FD78F18AB06D76FEB7531609EED58B369E10F08EE3D61B2A80A45196F6D76F2AC6249726D01E30102F1A6671B81F275C845238 |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6712 |
Entropy (8bit): | 3.943977525490966 |
Encrypted: | false |
SSDEEP: | 96:UeIX+tip7uemP4I3bYFE6H6IyYrL9Cu6d0CGeSG4qb6Yiigx9BGWsy:Uegda4Irx6HhGLbqig7Lsy |
MD5: | 69B6FEC924C30042D329AE56CA8925CC |
SHA1: | 54E8D7D9004C8C819FE2E8BF7A1306BCBDD5ECBF |
SHA-256: | 45494CE819C1B5C21ABB72DC47A0CA36807E0ED74CE55B631DA174C77A9B24DB |
SHA-512: | A6BC866712C2B6D2EC115341DE6EC5B352505FFF159AF967B03D27AD767164271F147780639E836A4DA54F4B2B688591EDF1374802CB5F7340062AEE9B341ABC |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20089 |
Entropy (8bit): | 5.450760869632819 |
Encrypted: | false |
SSDEEP: | 384:GzXpHVPakjq16uZuDxqLOvCxXEAjT90DVBAMBTaU:05Hr+EGlXbT9uAQGU |
MD5: | BE7438420F1DA854917F58CAD557476D |
SHA1: | CAF1095963459AB66326CDC7ECAB29514938748F |
SHA-256: | 2A946F316EDD7E1185DEEAFDC2DE52B2D2843198BE098A724233C12F9CCD0DAE |
SHA-512: | E35442704374A3B5E79BAD491F819AC82CE3054ED50AE1EEF0FC3ACBB6D3016BDBCDD63902236E247CB4B8279FF8FEC377AFA2753EBDBCA911D6D388D23A63DB |
Malicious: | false |
Preview: |
Process: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19680 |
Entropy (8bit): | 6.177213515531636 |
Encrypted: | false |
SSDEEP: | 384:3P2ie5TwxdKe9Vk5DT6Im2ULzQFAQOCsznlUt+3x:OiesSVTZm2ULz4A27wx |
MD5: | B6F4A83911336E84BEAD8F8905285FAB |
SHA1: | 983786502F45AFB946F023D73E32A31BC1BBB91D |
SHA-256: | 0ECD1222627271EA31D3B64796992B6DAF5133D64CC26D43B3873CBE32FD59CB |
SHA-512: | 93E949EA7CF067E1CEC52F6DDE8678FC7BCEB2E947164040A087FDD63E799CC244EB6974323FC836F70AE777A67E9660F4E9E2DBB42DC0C4B099B1C2BE168964 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.499781496634125 |
TrID: |
|
File name: | CH341SER.EXE |
File size: | 243'321 bytes |
MD5: | 1af3fdebfbab3e247feb588aea64dd64 |
SHA1: | d557a8978877199bafe2e7baac63adab17bed05d |
SHA256: | 9cf96fddf474eda80f2b4c09f8ef19443cf6768429819e4cba7b869291b7b8b5 |
SHA512: | d0b7c4dd6726d8e1e894654f671bf4e00c1fdb91fc46f40bb02fd689ff2cca8036b92c1358e10f810fc3e1b518cbcf91b0a1e3a3ee8d36d179ec7bab43ea35c9 |
SSDEEP: | 3072:h8U2yJN5f661xRZbALxB1Ojdgx8GYXfPGJ6I7onkduFJcc0WMc23dFORPSPo46Om:h8U2qy6rRZb7jxGYXDFJmWM93dYlGAGs |
TLSH: | 4C34E110BBD241F6D0811B3018BD6376DA38FF212E70F299DBDA5D5A2C34612B51EBB6 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 471e1f4de743726d |
Entrypoint: | 0x401000 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x465278A2 [Tue May 22 04:59:14 2007 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | bc5ce990cf54f8d435a68eb97512f73e |
Instruction |
---|
call 00007FE5B0DFFD54h |
push eax |
call 00007FE5B0E10364h |
add byte ptr [eax], al |
add byte ptr [eax], al |
nop |
push ebp |
mov ebp, esp |
push ebx |
push esi |
push edi |
mov edi, dword ptr [ebp+10h] |
mov ebx, dword ptr [ebp+0Ch] |
mov esi, dword ptr [ebp+08h] |
mov edx, ebx |
push dword ptr [ebp+14h] |
push 004150E1h |
push 00000000h |
push 00000000h |
mov eax, esi |
mov ecx, edi |
call 00007FE5B0E01977h |
sub ebx, 00000110h |
je 00007FE5B0DFD227h |
dec ebx |
je 00007FE5B0DFD236h |
jmp 00007FE5B0DFD279h |
push dword ptr [ebp+14h] |
push 00000066h |
push esi |
call 00007FE5B0E105C3h |
mov eax, 00000001h |
jmp 00007FE5B0DFD269h |
and di, FFFFh |
dec di |
je 00007FE5B0DFD229h |
dec di |
je 00007FE5B0DFD245h |
jmp 00007FE5B0DFD252h |
push 00000080h |
push 004169A4h |
push 00000065h |
push esi |
call 00007FE5B0E10509h |
push 00000001h |
push esi |
call 00007FE5B0E104E3h |
mov eax, 00000001h |
jmp 00007FE5B0DFD237h |
push 00000000h |
push esi |
call 00007FE5B0E104D4h |
mov eax, 00000001h |
jmp 00007FE5B0DFD228h |
xor eax, eax |
jmp 00007FE5B0DFD224h |
xor eax, eax |
pop edi |
pop esi |
pop ebx |
pop ebp |
retn 0010h |
push ebp |
mov ebp, esp |
push ebx |
push esi |
push edi |
mov edi, dword ptr [ebp+10h] |
mov ebx, dword ptr [ebp+0Ch] |
mov esi, dword ptr [ebp+08h] |
mov edx, ebx |
push dword ptr [ebp+14h] |
push 004150EEh |
push 00000000h |
push 00000000h |
mov eax, esi |
mov ecx, edi |
call 00007FE5B0E018E4h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1c000 | 0xfd1 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1d000 | 0x2bcc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x14000 | 0x13600 | False | 0.5781502016129032 | data | 6.444189953264481 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x15000 | 0x7000 | 0xa00 | False | 0.496484375 | data | 4.918269561248089 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x1c000 | 0x1000 | 0x1000 | False | 0.38232421875 | GeoSwath RDF | 5.123895815314081 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x1d000 | 0x4000 | 0x3c00 | False | 0.24368489583333333 | data | 3.5286611763859055 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_BITMAP | 0x1d420 | 0xbb6 | Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/m | Russian | Russia | 0.2581721147431621 |
RT_ICON | 0x1dfd8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | 0.40591397849462363 | ||
RT_DIALOG | 0x1e2c0 | 0x282 | data | Russian | Russia | 0.5046728971962616 |
RT_DIALOG | 0x1e544 | 0x13a | data | Russian | Russia | 0.6019108280254777 |
RT_DIALOG | 0x1e680 | 0xe8 | data | Russian | Russia | 0.6939655172413793 |
RT_DIALOG | 0x1e768 | 0x12e | data | Russian | Russia | 0.5794701986754967 |
RT_DIALOG | 0x1e898 | 0x338 | data | Russian | Russia | 0.4344660194174757 |
RT_DIALOG | 0x1ebd0 | 0x222 | data | Russian | Russia | 0.5604395604395604 |
RT_STRING | 0x1edf4 | 0x22c | data | Russian | Russia | 0.420863309352518 |
RT_STRING | 0x1f020 | 0x3b2 | data | Russian | Russia | 0.3964059196617336 |
RT_STRING | 0x1f3d4 | 0x212 | data | Russian | Russia | 0.4339622641509434 |
RT_STRING | 0x1f5e8 | 0x27e | data | Russian | Russia | 0.4122257053291536 |
RT_RCDATA | 0x1f868 | 0x10 | data | 1.5 | ||
RT_GROUP_ICON | 0x1f878 | 0x14 | data | 1.15 | ||
RT_MANIFEST | 0x1f88c | 0x33f | XML 1.0 document, ASCII text, with CRLF line terminators | Russian | Russia | 0.48736462093862815 |
DLL | Import |
---|---|
ADVAPI32.DLL | AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, SetFileSecurityA, SetFileSecurityW |
KERNEL32.DLL | CloseHandle, CompareStringA, CreateDirectoryA, CreateDirectoryW, CreateFileA, CreateFileW, DeleteFileA, DeleteFileW, DosDateTimeToFileTime, ExitProcess, ExpandEnvironmentStringsA, FileTimeToLocalFileTime, FileTimeToSystemTime, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileA, FindNextFileW, FindResourceA, FreeLibrary, GetCPInfo, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetDateFormatA, GetFileAttributesA, GetFileAttributesW, GetFileType, GetFullPathNameA, GetLastError, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetNumberFormatA, GetProcAddress, GetProcessHeap, GetStdHandle, GetTempPathA, GetTickCount, GetTimeFormatA, GetVersionExA, GlobalAlloc, HeapAlloc, HeapFree, HeapReAlloc, IsDBCSLeadByte, LoadLibraryA, LocalFileTimeToFileTime, MoveFileA, MoveFileExA, MultiByteToWideChar, ReadFile, SetCurrentDirectoryA, SetEndOfFile, SetEnvironmentVariableA, SetFileAttributesA, SetFileAttributesW, SetFilePointer, SetFileTime, SetLastError, Sleep, SystemTimeToFileTime, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcmpiA, lstrlenA |
COMCTL32.DLL | |
COMDLG32.DLL | CommDlgExtendedError, GetOpenFileNameA, GetSaveFileNameA |
GDI32.DLL | DeleteObject |
SHELL32.DLL | SHBrowseForFolderA, SHChangeNotify, SHFileOperationA, SHGetFileInfoA, SHGetMalloc, SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA |
USER32.DLL | CharToOemA, CharToOemBuffA, CharUpperA, CopyRect, CreateWindowExA, DefWindowProcA, DestroyIcon, DestroyWindow, DialogBoxParamA, DispatchMessageA, EnableWindow, EndDialog, FindWindowExA, GetClassNameA, GetClientRect, GetDlgItem, GetDlgItemTextA, GetMessageA, GetParent, GetSysColor, GetSystemMetrics, GetWindow, GetWindowLongA, GetWindowRect, GetWindowTextA, IsWindow, IsWindowVisible, LoadBitmapA, LoadCursorA, LoadIconA, LoadStringA, MapWindowPoints, MessageBoxA, OemToCharA, OemToCharBuffA, PeekMessageA, PostMessageA, RegisterClassExA, SendDlgItemMessageA, SendMessageA, SetDlgItemTextA, SetFocus, SetMenu, SetWindowLongA, SetWindowPos, SetWindowTextA, ShowWindow, TranslateMessage, UpdateWindow, WaitForInputIdle, wsprintfA, wvsprintfA |
OLE32.DLL | CLSIDFromString, CoCreateInstance, CreateStreamOnHGlobal, OleInitialize, OleUninitialize |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 19:37:36 |
Start date: | 11/12/2023 |
Path: | C:\Users\user\Desktop\CH341SER.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 243'321 bytes |
MD5 hash: | 1AF3FDEBFBAB3E247FEB588AEA64DD64 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 19:37:36 |
Start date: | 11/12/2023 |
Path: | C:\WCH.CN\CH341SER\SETUP.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 100'288 bytes |
MD5 hash: | 181F68547D52360FC142AC3ADC2436B7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 9 |
Start time: | 19:37:37 |
Start date: | 11/12/2023 |
Path: | C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1000000 |
File size: | 47'040 bytes |
MD5 hash: | 1FE688688C2082B37827DB54C4282AF0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 16 |
Start time: | 19:38:41 |
Start date: | 11/12/2023 |
Path: | C:\Windows\System32\drvinst.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff74f210000 |
File size: | 337'920 bytes |
MD5 hash: | 294990C88B9D1FE0A54A1FA8BF4324D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |