× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6603c62249f5fa7b3248462af1930e10ab06b5706a16c0b1d7296da9aeeb6110
File name: Cell
Detection ratio: 51 / 68
Analysis date: 2018-08-03 10:53:42 UTC ( 4 months, 1 week ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Symmi.36670 20180803
AegisLab Troj.Spy.W32.Zbot.rtlm!c 20180803
AhnLab-V3 Trojan/Win32.Zbot.R100848 20180803
ALYac Gen:Variant.Symmi.36670 20180803
Antiy-AVL Trojan[Spy]/Win32.Zbot 20180803
Arcabit Trojan.Symmi.D8F3E 20180803
Avast Win32:Downloader-VBK [Trj] 20180802
AVG Win32:Downloader-VBK [Trj] 20180802
Avira (no cloud) TR/Spy.Zbot.jlyu 20180803
AVware Trojan.Win32.Injector.awxd (v) 20180727
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9979 20180802
BitDefender Gen:Variant.Symmi.36670 20180803
CAT-QuickHeal TrojanPWS.Zbot.AP4 20180803
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.a6ab80 20180225
Cylance Unsafe 20180803
DrWeb Trojan.PWS.Panda.547 20180803
Emsisoft Gen:Variant.Symmi.36670 (B) 20180803
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Injector.AXJM 20180803
Fortinet W32/ZBOT.QU!tr 20180803
GData Gen:Variant.Symmi.36670 20180803
Ikarus Virus.Win32.CeeInject 20180803
Sophos ML heuristic 20180717
Jiangmin Trojan/Snocry.bp 20180803
K7AntiVirus Trojan ( 00496a7b1 ) 20180803
K7GW Trojan ( 00496a7b1 ) 20180803
Kaspersky HEUR:Trojan.Win32.Generic 20180803
Malwarebytes Spyware.Zbot.ED 20180803
MAX malware (ai score=80) 20180803
McAfee Downloader-FYH!CA1AEE1A6AB8 20180803
McAfee-GW-Edition BehavesLike.Win32.Generic.fc 20180803
Microsoft PWS:Win32/Zbot 20180803
eScan Gen:Variant.Symmi.36670 20180803
NANO-Antivirus Trojan.Win32.Inject.cumczg 20180803
Palo Alto Networks (Known Signatures) generic.ml 20180803
Panda Trj/Genetic.gen 20180802
Qihoo-360 HEUR/Malware.QVM07.Gen 20180803
Rising Trojan.Win32.Generic.1695D9C1 (C64:YzY0Ol3+rrB1MoHR) 20180803
Sophos AV Mal/Zbot-QU 20180803
Symantec ML.Attribute.HighConfidence 20180803
Tencent Win32.Trojan-spy.Zbot.Sxoc 20180803
TrendMicro TROJ_MALKRYP.SM1 20180803
TrendMicro-HouseCall TROJ_MALKRYP.SM1 20180803
VBA32 BScope.Malware-Cryptor.Hlux 20180802
VIPRE Trojan.Win32.Injector.awxd (v) 20180803
ViRobot Trojan.Win32.Agent.192512.BX 20180803
Webroot Trojan.Dropper.Gen 20180803
Yandex TrojanSpy.Zbot!G9ZeMerqcsA 20180803
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180803
Zoner Trojan.Injector.AZSD 20180803
Alibaba 20180713
Avast-Mobile 20180802
Babable 20180725
Bkav 20180803
ClamAV 20180803
CMC 20180803
Comodo 20180803
Cyren 20180803
eGambit 20180803
F-Prot 20180803
F-Secure 20180731
Kingsoft 20180803
SentinelOne (Static ML) 20180701
SUPERAntiSpyware 20180803
Symantec Mobile Insight 20180801
TACHYON 20180803
TheHacker 20180802
TotalDefense 20180803
Trustlook 20180803
Zillya 20180802
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright ? 2014

Product Cell
Original name Cell.exe
Internal name Cell
File version 1, 0, 0, 1
Description Cell
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-03-09 15:33:41
Entry Point 0x00007678
Number of sections 4
PE sections
Overlays
MD5 ee44a9f24729056b6fab566a71291101
File type data
Offset 356352
Size 1024
Entropy 7.81
PE imports
GetDeviceCaps
SetBrushOrgEx
CreateFontIndirectW
EnumFontFamiliesExW
GetStockObject
GetObjectW
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
GetCurrentProcessId
OpenProcess
GetStartupInfoW
GetModuleHandleW
Ord(2374)
Ord(2486)
Ord(4073)
Ord(6048)
Ord(4422)
Ord(2072)
Ord(2430)
Ord(4523)
Ord(3577)
Ord(6278)
Ord(2873)
Ord(5098)
Ord(4360)
Ord(5236)
Ord(5256)
Ord(2502)
Ord(3076)
Ord(3345)
Ord(4233)
Ord(882)
Ord(3060)
Ord(2381)
Ord(6124)
Ord(4199)
Ord(617)
Ord(4154)
Ord(4604)
Ord(2874)
Ord(6136)
Ord(4431)
Ord(1767)
Ord(5468)
Ord(6617)
Ord(3592)
Ord(4418)
Ord(5784)
Ord(2641)
Ord(3864)
Ord(1850)
Ord(5296)
Ord(4831)
Ord(2715)
Ord(4426)
Ord(3725)
Ord(858)
Ord(5783)
Ord(640)
Ord(4817)
Ord(4324)
Ord(2377)
Ord(4074)
Ord(5180)
Ord(4421)
Ord(4520)
Ord(5599)
Ord(4947)
Ord(5193)
Ord(4692)
Ord(4116)
Ord(501)
Ord(6185)
Ord(2391)
Ord(1937)
Ord(2015)
Ord(3793)
Ord(3826)
Ord(4051)
Ord(652)
Ord(5094)
Ord(2793)
Ord(561)
Ord(1083)
Ord(6372)
Ord(3131)
Ord(2618)
Ord(529)
Ord(296)
Ord(2382)
Ord(1703)
Ord(6365)
Ord(6113)
Ord(4621)
Ord(354)
Ord(2980)
Ord(6567)
Ord(3346)
Ord(5727)
Ord(2093)
Ord(3744)
Ord(3167)
Ord(4717)
Ord(4852)
Ord(4539)
Ord(2977)
Ord(815)
Ord(4525)
Ord(4428)
Ord(3566)
Ord(3092)
Ord(941)
Ord(2522)
Ord(4213)
Ord(6279)
Ord(6195)
Ord(3649)
Ord(2732)
Ord(1708)
Ord(5986)
Ord(825)
Ord(5251)
Ord(5244)
Ord(4222)
Ord(2858)
Ord(4335)
Ord(1792)
Ord(6017)
Ord(6125)
Ord(2403)
Ord(5499)
Ord(283)
Ord(2504)
Ord(4369)
Ord(4392)
Ord(6150)
Ord(4607)
Ord(656)
Ord(4298)
Ord(4147)
Ord(2875)
Ord(5817)
Ord(2613)
Ord(4609)
Ord(4884)
Ord(554)
Ord(2116)
Ord(3053)
Ord(796)
Ord(293)
Ord(5070)
Ord(5977)
Ord(4241)
Ord(986)
Ord(4419)
Ord(713)
Ord(2640)
Ord(4018)
Ord(3254)
Ord(1165)
Ord(4451)
Ord(5855)
Ord(5273)
Ord(2534)
Ord(4158)
Ord(4704)
Ord(402)
Ord(1720)
Ord(1637)
Ord(4420)
Ord(2436)
Ord(5596)
Ord(3733)
Ord(4518)
Ord(6171)
Ord(5208)
Ord(411)
Ord(1143)
Ord(5059)
Ord(5230)
Ord(6211)
Ord(4103)
Ord(976)
Ord(860)
Ord(5239)
Ord(2576)
Ord(3605)
Ord(3820)
Ord(2406)
Ord(1863)
Ord(537)
Ord(6332)
Ord(4292)
Ord(6371)
Ord(2438)
Ord(665)
Ord(2619)
Ord(3657)
Ord(4240)
Ord(5006)
Ord(4381)
Ord(5736)
Ord(616)
Ord(2606)
Ord(5436)
Ord(2383)
Ord(6126)
Ord(4616)
Ord(4462)
Ord(3257)
Ord(879)
Ord(3917)
Ord(3449)
Ord(2388)
Ord(567)
Ord(4414)
Ord(3747)
Ord(1971)
Ord(4955)
Ord(341)
Ord(5276)
Ord(540)
Ord(2371)
Ord(4480)
Ord(401)
Ord(823)
Ord(2047)
Ord(5096)
Ord(1569)
Ord(5250)
Ord(3074)
Ord(4269)
Ord(5233)
Ord(6266)
Ord(975)
Ord(2505)
Ord(5080)
Ord(538)
Ord(4606)
Ord(3398)
Ord(4608)
Ord(3290)
Ord(4459)
Ord(2810)
Ord(4893)
Ord(323)
Ord(2109)
Ord(773)
Ord(5467)
Ord(3312)
Ord(807)
Ord(4128)
Ord(472)
Ord(5871)
Ord(2971)
Ord(1817)
Ord(1658)
Ord(324)
Ord(2527)
Ord(4847)
Ord(4075)
Ord(5878)
Ord(2627)
Ord(5854)
Ord(2717)
Ord(4583)
Ord(6115)
Ord(3976)
_except_handler3
__p__fmode
malloc
__CxxFrameHandler
_exit
__p__commode
__setusermatherr
__dllonexit
_onexit
__wgetmainargs
wcscmp
wcscat
exit
_XcptFilter
_wfopen
_initterm
_controlfp
_wcmdln
_adjust_fdiv
__set_app_type
GetModuleFileNameExW
ReleaseDC
GetSysColor
SendMessageW
UpdateWindow
IntersectRect
EnableWindow
PtInRect
SetClassLongW
GetClientRect
LoadCursorW
GetWindowDC
GetSubMenu
InvalidateRect
LoadMenuW
SetCursor
Number of PE resources by type
RT_STRING 16
RT_MENU 3
Struct(241) 2
RT_BITMAP 2
RT_DIALOG 1
RT_RCDATA 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
CHINESE SIMPLIFIED 26
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.1

LanguageCode
German (Swiss)

FileFlagsMask
0x003f

FileDescription
Cell

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
319488

EntryPoint
0x7678

OriginalFileName
Cell.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright ? 2014

FileVersion
1, 0, 0, 1

TimeStamp
2014:03:09 16:33:41+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Cell

ProductVersion
1, 0, 0, 1

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
32768

ProductName
Cell

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ca1aee1a6ab80045ce3663e94626bb65
SHA1 b3ae705c39b0f4048d183c27522bf65c52bfcfc4
SHA256 6603c62249f5fa7b3248462af1930e10ab06b5706a16c0b1d7296da9aeeb6110
ssdeep
6144:gEuTRFzj+rIXIzn5055LscpOB3jAVilf7n+M0RUBtdNAA68TXKNkiNhLb7cmU:gEufoI4T5oZpCUYlaRgtdNAA68TX1QNK

authentihash f8dd47e7ddb8d3bd2b8e9f469ea4c46c6f7b0bdeb412878b2634491309e9765a
imphash fe7cc1778431a52b4bced69ee580e3e2
File size 349.0 KB ( 357376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-03-20 08:53:49 UTC ( 4 years, 8 months ago )
Last submission 2014-03-20 08:53:49 UTC ( 4 years, 8 months ago )
File names Cell
vt-upload-8Nc0l
Cell.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.