× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
File name: b_cr.exe-jhzMbG
Detection ratio: 45 / 53
Analysis date: 2014-11-05 18:24:21 UTC ( 4 months, 3 weeks ago )
Antivirus Result Update
AVG Zbot.JWC 20141105
AVware Trojan.Win32.Generic.pak!cobra 20141105
Ad-Aware Trojan.GenericKD.1713076 20141105
AegisLab Troj.W32.Gen 20141105
Agnitum TrojanSpy.Zbot!NjVihZ2L8zM 20141105
AhnLab-V3 Trojan/Win32.Zbot 20141105
Antiy-AVL Trojan[Spy]/Win32.Zbot 20141105
Avast Win32:Crypt-REG [Trj] 20141105
Avira TR/Dropper.A.24727 20141105
Baidu-International Trojan.Win32.Zbot.ajY 20141103
BitDefender Trojan.GenericKD.1713076 20141105
CAT-QuickHeal TrojanPWS.Zbot.AP4 20141105
Comodo UnclassifiedMalware 20141105
Cyren W32/Trojan.TVAH-3461 20141105
DrWeb Trojan.Emotet.21 20141105
ESET-NOD32 Win32/Spy.Zbot.YW 20141105
Emsisoft Trojan.GenericKD.1713076 (B) 20141105
F-Prot W32/Trojan2.OHKC 20141105
F-Secure Trojan.GenericKD.1713076 20141105
Fortinet W32/Kryptik.MFCE!tr 20141105
GData Trojan.GenericKD.1713076 20141105
Ikarus Trojan.Zbot 20141105
Jiangmin TrojanSpy.Zbot.herw 20141104
K7AntiVirus Spyware ( 00009b291 ) 20141103
K7GW Spyware ( 00009b291 ) 20141105
Kaspersky Trojan-Spy.Win32.Zbot.tfdc 20141105
Kingsoft Win32.Troj.Zbot.tf.(kcloud) 20141105
Malwarebytes Spyware.Zbot.ED 20141105
McAfee Generic-FAUT!596BA17393B1 20141105
McAfee-GW-Edition BehavesLike.Win32.HLLPSassy.dc 20141105
MicroWorld-eScan Trojan.GenericKD.1713076 20141105
Microsoft VirTool:Win32/CeeInject.gen!KK 20141105
NANO-Antivirus Trojan.Win32.Zbot.daxbdl 20141105
Norman ZBot.VMZW 20141105
Qihoo-360 Win32/Trojan.Spy.aa4 20141105
SUPERAntiSpyware Trojan.Agent/Gen-Zbot 20141105
Sophos Troj/Zbot-IMB 20141105
Symantec Trojan.Zbot 20141105
Tencent Win32.Trojan.Bp-qqthief.Iqpl 20141105
TrendMicro TROJ_CRYPLOCK.SM 20141105
VBA32 TrojanSpy.Zbot 20141105
VIPRE Trojan.Win32.Generic.pak!cobra 20141105
ViRobot Trojan.Win32.A.Zbot.221696.EC 20141105
Zillya Trojan.Zbot.Win32.157457 20141105
nProtect Trojan-Spy/W32.ZBot.221696.BS 20141105
Bkav 20141105
ByteHero 20141105
CMC 20141104
ClamAV 20141105
Rising 20141105
TheHacker 20141104
TotalDefense 20141105
Zoner 20141104
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
Copyright ? 2014

Publisher
Product OwnDrawButton
Original name OwnDrawButton.exe
Internal name OwnDrawButton
File version 1, 0, 0, 1
Description OwnDrawButton
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-06-01 05:38:48
Link date 6:38 AM 6/1/2014
Entry Point 0x000068DF
Number of sections 4
PE sections
PE imports
PaintRgn
CreatePolygonRgn
SelectObject
GetTextExtentPoint32A
CreatePen
CreateSolidBrush
BitBlt
CreateCompatibleDC
RoundRect
Rectangle
GetStartupInfoA
GetModuleFileNameW
GetModuleHandleA
Ord(1775)
Ord(4080)
Ord(4710)
Ord(2414)
Ord(3597)
Ord(1641)
Ord(3136)
Ord(6375)
Ord(3626)
Ord(755)
Ord(3798)
Ord(6052)
Ord(3259)
Ord(5290)
Ord(2446)
Ord(2864)
Ord(4297)
Ord(5875)
Ord(4441)
Ord(5787)
Ord(815)
Ord(641)
Ord(5788)
Ord(5277)
Ord(2514)
Ord(4425)
Ord(5199)
Ord(567)
Ord(4133)
Ord(4465)
Ord(609)
Ord(5300)
Ord(1200)
Ord(4627)
Ord(1168)
Ord(3738)
Ord(4853)
Ord(2982)
Ord(4234)
Ord(825)
Ord(3081)
Ord(3092)
Ord(5307)
Ord(3574)
Ord(4424)
Ord(540)
Ord(3706)
Ord(4078)
Ord(2554)
Ord(6376)
Ord(1727)
Ord(823)
Ord(2754)
Ord(2379)
Ord(2725)
Ord(640)
Ord(3874)
Ord(4998)
Ord(5981)
Ord(800)
Ord(3749)
Ord(2512)
Ord(470)
Ord(4274)
Ord(5261)
Ord(2859)
Ord(4079)
Ord(1146)
Ord(3147)
Ord(2124)
Ord(2621)
Ord(2405)
Ord(4284)
Ord(3262)
Ord(5241)
Ord(1576)
Ord(3573)
Ord(4353)
Ord(2575)
Ord(5065)
Ord(4407)
Ord(4275)
Ord(3663)
Ord(3346)
Ord(3693)
Ord(2396)
Ord(3831)
Ord(6374)
Ord(5280)
Ord(3825)
Ord(2976)
Ord(323)
Ord(1089)
Ord(2985)
Ord(3922)
Ord(2818)
Ord(4376)
Ord(3402)
Ord(324)
Ord(3830)
Ord(2385)
Ord(3079)
Ord(4396)
Ord(2055)
Ord(4837)
Ord(3571)
Ord(1776)
Ord(2648)
Ord(5714)
Ord(5289)
Ord(4622)
Ord(561)
Ord(1640)
Ord(2302)
Ord(4486)
Ord(4698)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4673)
Ord(5302)
Ord(5731)
__p__fmode
_acmdln
_wfopen
memset
fclose
__dllonexit
printf
fopen
_except_handler3
fseek
_onexit
ftell
exit
_XcptFilter
rewind
__setusermatherr
__p__commode
__CxxFrameHandler
fread
_adjust_fdiv
__getmainargs
_controlfp
_setmbcp
_initterm
_exit
__set_app_type
GetWindowLongA
GetSystemMetrics
GetSysColor
MessageBoxA
LoadIconA
ReleaseCapture
GetCapture
EnableWindow
wsprintfA
PtInRect
SetCapture
DrawIcon
LoadBitmapA
SendMessageA
GetClientRect
CopyRect
GetFocus
IsIconic
SetRect
GetDC
InvalidateRect
Number of PE resources by type
RT_ICON 1
RT_VXD 1
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 3
CHINESE *unknown* 1
CHINESE SIMPLIFIED 1
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2014:06:01 06:38:48+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
7.0

FileAccessDate
2014:11:05 19:27:05+01:00

Warning
Invalid Version Info block

EntryPoint
0x68df

InitializedDataSize
192512

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

FileCreateDate
2014:11:05 19:27:05+01:00

UninitializedDataSize
0

Compressed bundles
File identification
MD5 596ba17393b18b8432cd14a127d7c6e2
SHA1 11f60acac2a8ac97f47ad367cc77a710f7db6804
SHA256 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
ssdeep
6144:avAttkPQvZ7kfzJB/N9km2klhfkr4BNJGm:+AtXZIfNBFWmF3M4

authentihash c66ead44f1d36aa4fac08fc7fd7b7f380df07b56c3f641ef43ec961d0dc01915
imphash bbaf2e91fcf28aed3b24335103409ad9
File size 216.5 KB ( 221696 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2014-06-11 08:02:29 UTC ( 9 months, 3 weeks ago )
Last submission 2014-11-05 18:24:21 UTC ( 4 months, 3 weeks ago )
File names 8D0C7F67057F063F27F8ABDF9C6A4050E47F96F7D7F425BE70A79008EB4F68A2
file-7121181_
OwnDrawButton
596ba17393b18b8432cd14a127d7c6e2
b_cr
596ba17393b18b8432cd14a127d7c6e2
vti-rescan
16.exe
30103296
2014-07-21-07-52-27-596ba17393b18b8432cd14a127d7c6e2
2014-07-20-14-31-22-596ba17393b18b8432cd14a127d7c6e2
b_cr.exe-jhzMbG
8.exe
b_cr.exe
12.exe
596ba17393b18b8432cd14a127d7c6e2
OwnDrawButton.exe
cr_b.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications