× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
File name: b_cr.exe-jhzMbG
Detection ratio: 47 / 56
Analysis date: 2015-07-29 22:43:25 UTC ( 1 day, 6 hours ago )
Antivirus Result Update
ALYac Gen:Variant.Symmi.43480 20150729
AVG Zbot.JWC 20150729
AVware Trojan.Win32.Generic.pak!cobra 20150729
Ad-Aware Gen:Variant.Symmi.43480 20150729
Agnitum TrojanSpy.Zbot!NjVihZ2L8zM 20150729
AhnLab-V3 Trojan/Win32.Zbot 20150729
Antiy-AVL Trojan[Spy]/Win32.Zbot 20150729
Arcabit Trojan.Symmi.DA9D8 20150729
Avast Win32:Crypt-REG [Trj] 20150729
Avira TR/Dropper.Gen 20150729
Baidu-International Trojan.Win32.Zbot.YW 20150729
BitDefender Gen:Variant.Symmi.43480 20150729
CAT-QuickHeal TrojanPWS.Zbot.AP4 20150728
Comodo UnclassifiedMalware 20150729
Cyren W32/Trojan.TVAH-3461 20150729
DrWeb Trojan.Emotet.21 20150729
ESET-NOD32 Win32/Spy.Zbot.YW 20150729
Emsisoft Gen:Variant.Symmi.43480 (B) 20150729
F-Prot W32/Trojan2.OHKC 20150729
F-Secure Gen:Variant.Symmi.43480 20150729
Fortinet W32/Kryptik.MFCE!tr 20150729
GData Gen:Variant.Symmi.43480 20150729
Ikarus Trojan.Zbot 20150729
Jiangmin TrojanSpy.Zbot.herw 20150729
K7AntiVirus Trojan ( 0049b9a11 ) 20150729
K7GW Trojan ( 0049b9a11 ) 20150729
Kaspersky HEUR:Trojan.Win32.Generic 20150729
Kingsoft Win32.Troj.Zbot.tf.(kcloud) 20150729
Malwarebytes Spyware.Zbot.ED 20150729
McAfee Generic-FAUT!596BA17393B1 20150729
McAfee-GW-Edition Generic-FAUT!596BA17393B1 20150729
MicroWorld-eScan Gen:Variant.Symmi.43480 20150729
Microsoft PWS:Win32/Zbot!VM 20150729
NANO-Antivirus Trojan.Win32.Zbot.daxbdl 20150729
Panda Trj/CI.A 20150729
Qihoo-360 Win32/Trojan.Spy.aa4 20150729
Rising PE:Trojan.Win32.Generic.16E133BA!383857594 20150728
SUPERAntiSpyware Trojan.Agent/Gen-Zbot 20150729
Sophos Troj/Zbot-IMB 20150729
Symantec Trojan.Zbot 20150729
TrendMicro TROJ_CRYPLOCK.SM 20150729
TrendMicro-HouseCall TROJ_CRYPLOCK.SM 20150729
VBA32 TrojanSpy.Zbot 20150729
VIPRE Trojan.Win32.Generic.pak!cobra 20150729
ViRobot Trojan.Win32.A.Zbot.221696.EC[h] 20150729
Zillya Trojan.Zbot.Win32.157457 20150729
nProtect Trojan-Spy/W32.ZBot.221696.BS 20150729
AegisLab 20150729
Alibaba 20150729
Bkav 20150729
ByteHero 20150729
ClamAV 20150729
Tencent 20150729
TheHacker 20150729
TotalDefense 20150729
Zoner 20150729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright ? 2014

Publisher
Product OwnDrawButton
Original name OwnDrawButton.exe
Internal name OwnDrawButton
File version 1, 0, 0, 1
Description OwnDrawButton
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-06-01 05:38:48
Link date 6:38 AM 6/1/2014
Entry Point 0x000068DF
Number of sections 4
PE sections
Overlays
MD5 12f2cd5046750139e56e4b37352f878a
File type data
Offset 221184
Size 512
Entropy 7.57
PE imports
PaintRgn
CreatePolygonRgn
SelectObject
GetTextExtentPoint32A
CreatePen
CreateSolidBrush
BitBlt
CreateCompatibleDC
RoundRect
Rectangle
GetStartupInfoA
GetModuleFileNameW
GetModuleHandleA
Ord(1775)
Ord(4080)
Ord(4710)
Ord(2414)
Ord(3597)
Ord(1641)
Ord(3136)
Ord(6375)
Ord(3626)
Ord(755)
Ord(3798)
Ord(6052)
Ord(3259)
Ord(5290)
Ord(2446)
Ord(2864)
Ord(4297)
Ord(5875)
Ord(4441)
Ord(5787)
Ord(815)
Ord(641)
Ord(5788)
Ord(5277)
Ord(2514)
Ord(4425)
Ord(5199)
Ord(567)
Ord(4133)
Ord(4465)
Ord(609)
Ord(5300)
Ord(1200)
Ord(4627)
Ord(1168)
Ord(3738)
Ord(4853)
Ord(2982)
Ord(4234)
Ord(825)
Ord(3081)
Ord(3092)
Ord(5307)
Ord(3574)
Ord(4424)
Ord(540)
Ord(3706)
Ord(4078)
Ord(2554)
Ord(6376)
Ord(1727)
Ord(823)
Ord(2754)
Ord(2379)
Ord(2725)
Ord(640)
Ord(3874)
Ord(4998)
Ord(5981)
Ord(800)
Ord(3749)
Ord(2512)
Ord(470)
Ord(4274)
Ord(5261)
Ord(2859)
Ord(4079)
Ord(1146)
Ord(3147)
Ord(2124)
Ord(2621)
Ord(2405)
Ord(4284)
Ord(3262)
Ord(5241)
Ord(1576)
Ord(3573)
Ord(4353)
Ord(2575)
Ord(5065)
Ord(4407)
Ord(4275)
Ord(3663)
Ord(3346)
Ord(3693)
Ord(2396)
Ord(3831)
Ord(6374)
Ord(5280)
Ord(3825)
Ord(2976)
Ord(323)
Ord(1089)
Ord(2985)
Ord(3922)
Ord(2818)
Ord(4376)
Ord(3402)
Ord(324)
Ord(3830)
Ord(2385)
Ord(3079)
Ord(4396)
Ord(2055)
Ord(4837)
Ord(3571)
Ord(1776)
Ord(2648)
Ord(5714)
Ord(5289)
Ord(4622)
Ord(561)
Ord(1640)
Ord(2302)
Ord(4486)
Ord(4698)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4673)
Ord(5302)
Ord(5731)
__p__fmode
_acmdln
_wfopen
memset
fclose
__dllonexit
printf
fopen
_except_handler3
fseek
_onexit
ftell
exit
_XcptFilter
rewind
__setusermatherr
__p__commode
__CxxFrameHandler
fread
_adjust_fdiv
__getmainargs
_controlfp
_setmbcp
_initterm
_exit
__set_app_type
GetWindowLongA
GetSystemMetrics
GetSysColor
MessageBoxA
LoadIconA
ReleaseCapture
GetCapture
EnableWindow
wsprintfA
PtInRect
SetCapture
DrawIcon
LoadBitmapA
SendMessageA
GetClientRect
CopyRect
GetFocus
IsIconic
SetRect
GetDC
InvalidateRect
Number of PE resources by type
RT_ICON 1
RT_VXD 1
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 3
CHINESE *unknown* 1
CHINESE SIMPLIFIED 1
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2014:06:01 06:38:48+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
7.0

Warning
Invalid Version Info block

EntryPoint
0x68df

InitializedDataSize
192512

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 596ba17393b18b8432cd14a127d7c6e2
SHA1 11f60acac2a8ac97f47ad367cc77a710f7db6804
SHA256 8d0c7f67057f063f27f8abdf9c6a4050e47f96f7d7f425be70a79008eb4f68a2
ssdeep
6144:avAttkPQvZ7kfzJB/N9km2klhfkr4BNJGm:+AtXZIfNBFWmF3M4

authentihash c66ead44f1d36aa4fac08fc7fd7b7f380df07b56c3f641ef43ec961d0dc01915
imphash bbaf2e91fcf28aed3b24335103409ad9
File size 216.5 KB ( 221696 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-06-11 08:02:29 UTC ( 1 year, 1 month ago )
Last submission 2015-07-29 22:43:25 UTC ( 1 day, 6 hours ago )
File names 8D0C7F67057F063F27F8ABDF9C6A4050E47F96F7D7F425BE70A79008EB4F68A2
file-7121181_
OwnDrawButton
596ba17393b18b8432cd14a127d7c6e2
b_cr
596ba17393b18b8432cd14a127d7c6e2
vti-rescan
16.exe
30103296
2014-07-21-07-52-27-596ba17393b18b8432cd14a127d7c6e2
2014-07-20-14-31-22-596ba17393b18b8432cd14a127d7c6e2
b_cr.exe-jhzMbG
8.exe
b_cr.exe
12.exe
596ba17393b18b8432cd14a127d7c6e2
OwnDrawButton.exe
cr_b.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications