× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
File name: b_cr.exe-jhzMbG
Detection ratio: 46 / 56
Analysis date: 2015-08-28 17:15:24 UTC ( 3 days, 16 hours ago )
Antivirus Result Update
ALYac Gen:Variant.Symmi.43480 20150828
AVG Zbot.JWC 20150828
AVware Trojan.Win32.Generic.pak!cobra 20150828
Ad-Aware Gen:Variant.Symmi.43480 20150828
Agnitum TrojanSpy.Zbot!NjVihZ2L8zM 20150828
AhnLab-V3 Trojan/Win32.Zbot 20150828
Antiy-AVL Trojan[Spy]/Win32.Zbot 20150828
Avast Win32:Crypt-REG [Trj] 20150828
Avira TR/Dropper.Gen 20150828
Baidu-International Trojan.Win32.Zbot.YW 20150828
BitDefender Gen:Variant.Symmi.43480 20150828
CAT-QuickHeal TrojanPWS.Zbot.AP4 20150828
Comodo UnclassifiedMalware 20150828
Cyren W32/Trojan.TVAH-3461 20150828
DrWeb Trojan.Emotet.21 20150828
ESET-NOD32 Win32/Spy.Zbot.YW 20150828
F-Prot W32/Trojan2.OHKC 20150828
F-Secure Gen:Variant.Symmi.43480 20150828
Fortinet W32/Kryptik.MFCE!tr 20150828
GData Gen:Variant.Symmi.43480 20150828
Ikarus Trojan-Spy.Win32.Zbot 20150828
Jiangmin TrojanSpy.Zbot.herw 20150827
K7AntiVirus Trojan ( 0049b9a11 ) 20150828
K7GW Trojan ( 0049b9a11 ) 20150828
Kaspersky HEUR:Trojan.Win32.Generic 20150828
Kingsoft Win32.Troj.Zbot.tf.(kcloud) 20150828
Malwarebytes Spyware.Zbot.ED 20150828
McAfee Generic-FAUT!596BA17393B1 20150828
McAfee-GW-Edition Generic-FAUT!596BA17393B1 20150828
MicroWorld-eScan Gen:Variant.Symmi.43480 20150828
Microsoft PWS:Win32/Zbot!VM 20150828
NANO-Antivirus Trojan.Win32.Zbot.daxbdl 20150828
Panda Trj/CI.A 20150828
Qihoo-360 Win32/Trojan.Spy.aa4 20150828
SUPERAntiSpyware Trojan.Agent/Gen-Zbot 20150826
Sophos Troj/Zbot-IMB 20150828
Symantec Trojan.Zbot 20150827
Tencent Win32.Trojan.Bp-qqthief.Iqpl 20150828
TheHacker Trojan/Spy.Zbot.yw 20150828
TrendMicro TROJ_CRYPLOCK.SM 20150828
TrendMicro-HouseCall TROJ_CRYPLOCK.SM 20150828
VBA32 TrojanSpy.Zbot 20150828
VIPRE Trojan.Win32.Generic.pak!cobra 20150828
ViRobot Trojan.Win32.A.Zbot.221696.EC[h] 20150828
Zillya Trojan.Zbot.Win32.157457 20150828
nProtect Trojan-Spy/W32.ZBot.221696.BS 20150828
AegisLab 20150828
Alibaba 20150828
Arcabit 20150828
Bkav 20150828
ByteHero 20150828
CMC 20150827
ClamAV 20150828
Rising 20150826
TotalDefense 20150828
Zoner 20150828
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright ? 2014

Publisher
Product OwnDrawButton
Original name OwnDrawButton.exe
Internal name OwnDrawButton
File version 1, 0, 0, 1
Description OwnDrawButton
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-06-01 05:38:48
Link date 6:38 AM 6/1/2014
Entry Point 0x000068DF
Number of sections 4
PE sections
Overlays
MD5 12f2cd5046750139e56e4b37352f878a
File type data
Offset 221184
Size 512
Entropy 7.57
PE imports
PaintRgn
CreatePolygonRgn
SelectObject
GetTextExtentPoint32A
CreatePen
CreateSolidBrush
BitBlt
CreateCompatibleDC
RoundRect
Rectangle
GetStartupInfoA
GetModuleFileNameW
GetModuleHandleA
Ord(1775)
Ord(4080)
Ord(4710)
Ord(2414)
Ord(3597)
Ord(1641)
Ord(3136)
Ord(6375)
Ord(3626)
Ord(755)
Ord(3798)
Ord(6052)
Ord(3259)
Ord(5290)
Ord(2446)
Ord(2864)
Ord(4297)
Ord(5875)
Ord(4441)
Ord(5787)
Ord(815)
Ord(641)
Ord(5788)
Ord(5277)
Ord(2514)
Ord(4425)
Ord(5199)
Ord(567)
Ord(4133)
Ord(4465)
Ord(609)
Ord(5300)
Ord(1200)
Ord(4627)
Ord(1168)
Ord(3738)
Ord(4853)
Ord(2982)
Ord(4234)
Ord(825)
Ord(3081)
Ord(3092)
Ord(5307)
Ord(3574)
Ord(4424)
Ord(540)
Ord(3706)
Ord(4078)
Ord(2554)
Ord(6376)
Ord(1727)
Ord(823)
Ord(2754)
Ord(2379)
Ord(2725)
Ord(640)
Ord(3874)
Ord(4998)
Ord(5981)
Ord(800)
Ord(3749)
Ord(2512)
Ord(470)
Ord(4274)
Ord(5261)
Ord(2859)
Ord(4079)
Ord(1146)
Ord(3147)
Ord(2124)
Ord(2621)
Ord(2405)
Ord(4284)
Ord(3262)
Ord(5241)
Ord(1576)
Ord(3573)
Ord(4353)
Ord(2575)
Ord(5065)
Ord(4407)
Ord(4275)
Ord(3663)
Ord(3346)
Ord(3693)
Ord(2396)
Ord(3831)
Ord(6374)
Ord(5280)
Ord(3825)
Ord(2976)
Ord(323)
Ord(1089)
Ord(2985)
Ord(3922)
Ord(2818)
Ord(4376)
Ord(3402)
Ord(324)
Ord(3830)
Ord(2385)
Ord(3079)
Ord(4396)
Ord(2055)
Ord(4837)
Ord(3571)
Ord(1776)
Ord(2648)
Ord(5714)
Ord(5289)
Ord(4622)
Ord(561)
Ord(1640)
Ord(2302)
Ord(4486)
Ord(4698)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4673)
Ord(5302)
Ord(5731)
__p__fmode
_acmdln
_wfopen
memset
fclose
__dllonexit
printf
fopen
_except_handler3
fseek
_onexit
ftell
exit
_XcptFilter
rewind
__setusermatherr
__p__commode
__CxxFrameHandler
fread
_adjust_fdiv
__getmainargs
_controlfp
_setmbcp
_initterm
_exit
__set_app_type
GetWindowLongA
GetSystemMetrics
GetSysColor
MessageBoxA
LoadIconA
ReleaseCapture
GetCapture
EnableWindow
wsprintfA
PtInRect
SetCapture
DrawIcon
LoadBitmapA
SendMessageA
GetClientRect
CopyRect
GetFocus
IsIconic
SetRect
GetDC
InvalidateRect
Number of PE resources by type
RT_ICON 1
RT_VXD 1
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 3
CHINESE *unknown* 1
CHINESE SIMPLIFIED 1
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2014:06:01 06:38:48+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
7.0

Warning
Invalid Version Info block

EntryPoint
0x68df

InitializedDataSize
192512

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 596ba17393b18b8432cd14a127d7c6e2
SHA1 11f60acac2a8ac97f47ad367cc77a710f7db6804
SHA256 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
ssdeep
6144:avAttkPQvZ7kfzJB/N9km2klhfkr4BNJGm:+AtXZIfNBFWmF3M4

authentihash c66ead44f1d36aa4fac08fc7fd7b7f380df07b56c3f641ef43ec961d0dc01915
imphash bbaf2e91fcf28aed3b24335103409ad9
File size 216.5 KB ( 221696 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-06-11 08:02:29 UTC ( 1 year, 2 months ago )
Last submission 2015-08-28 17:15:24 UTC ( 3 days, 16 hours ago )
File names 8D0C7F67057F063F27F8ABDF9C6A4050E47F96F7D7F425BE70A79008EB4F68A2
file-7121181_
OwnDrawButton
596ba17393b18b8432cd14a127d7c6e2
b_cr
596ba17393b18b8432cd14a127d7c6e2
vti-rescan
16.exe
30103296
2014-07-21-07-52-27-596ba17393b18b8432cd14a127d7c6e2
2014-07-20-14-31-22-596ba17393b18b8432cd14a127d7c6e2
b_cr.exe-jhzMbG
8.exe
b_cr.exe
12.exe
596ba17393b18b8432cd14a127d7c6e2
OwnDrawButton.exe
cr_b.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications