× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ef81655351da1e4a43f4feb8f57373ecceff2dd6e80e70a1936ffe55c4ee6246
File name: Strkbandagers3
Detection ratio: 51 / 66
Analysis date: 2017-10-11 20:21:31 UTC ( 6 days, 23 hours ago )
Antivirus Result Update
Ad-Aware Trojan.Injector.VB.BA 20171011
AegisLab Troj.W32.Vbkryjetor!c 20171011
AhnLab-V3 Win-Trojan/VBKrypt.RP 20171011
ALYac Trojan.Injector.VB.BA 20171011
Antiy-AVL Trojan/Win32.VBKryjetor 20171011
Arcabit Trojan.Injector.VB.BA 20171011
Avast Win32:Malware-gen 20171011
AVG Win32:Malware-gen 20171011
Avira (no cloud) TR/Dropper.VB.dtesr 20171011
AVware Trojan.Win32.Generic!BT 20171011
BitDefender Trojan.Injector.VB.BA 20171011
CAT-QuickHeal TrojanSpy.Omaneat 20171011
ClamAV Win.Packed.VbProtect-6261556-0 20171011
Comodo UnclassifiedMalware 20171011
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170804
Cyren W32/Trojan.PRQL-5434 20171011
DrWeb Trojan.MulDrop7.11154 20171011
Emsisoft Trojan.Injector (A) 20171011
Endgame malicious (high confidence) 20170821
ESET-NOD32 a variant of Win32/Injector.DNUC 20171011
F-Secure Trojan.Injector.VB.BA 20171011
Fortinet W32/Injector.DNUC!tr 20171011
GData Trojan.Injector.VB.BA 20171011
Ikarus Trojan.Injector 20171011
Sophos ML heuristic 20170914
Jiangmin Trojan.VBKryjetor.ebh 20171011
K7AntiVirus Trojan ( 0050b4db1 ) 20171011
K7GW Trojan ( 0050b4db1 ) 20171011
Kaspersky HEUR:Trojan.Win32.Generic 20171011
Malwarebytes Trojan.MalPack.VB 20171011
MAX malware (ai score=80) 20171011
McAfee Artemis!FD3676CD49C9 20171011
McAfee-GW-Edition BehavesLike.Win32.Trojan.rt 20171011
Microsoft TrojanSpy:MSIL/Omaneat.C 20171011
eScan Trojan.Injector.VB.BA 20171011
NANO-Antivirus Trojan.Win32.VBKryjetor.enrpgb 20171011
Palo Alto Networks (Known Signatures) generic.ml 20171011
Panda Trj/GdSda.A 20171011
Qihoo-360 Win32/Trojan.1aa 20171011
SentinelOne (Static ML) static engine - malicious 20171001
Sophos AV Mal/FareitVB-M 20171011
Symantec Trojan.Klonzyrat 20171011
Tencent Win32.Trojan.Generic.Eeha 20171011
TrendMicro TSPY_ZBOT.YUYAXG 20171011
TrendMicro-HouseCall TSPY_ZBOT.YUYAXG 20171011
VBA32 Trojan.VBKryjetor 20171011
VIPRE Trojan.Win32.Generic!BT 20171011
ViRobot Trojan.Win32.Z.Zyklon.5214208 20171011
Webroot W32.Botnet.Zyklon 20171011
Yandex Trojan.Injector!Kve82t293/M 20171011
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20171011
Alibaba 20170911
Avast-Mobile 20171011
Baidu 20171011
Bkav 20171011
CMC 20171011
Cylance 20171011
F-Prot 20171011
Kingsoft 20171011
nProtect 20171011
Rising 20171011
SUPERAntiSpyware 20171011
Symantec Mobile Insight 20171011
TheHacker 20171007
TotalDefense 20171011
Trustlook 20171011
WhiteArmor 20170927
Zillya 20171011
Zoner 20171011
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Canon

Product Canon
Original name Strkbandagers3.exe
Internal name Strkbandagers3
File version 1.00
Description Canon
Comments Canon
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-04-13 00:18:41
Entry Point 0x00001194
Number of sections 3
PE sections
PE imports
_adj_fdiv_m32
__vbaChkstk
_CIcos
__vbaEnd
EVENT_SINK_QueryInterface
_allmul
_adj_fprem
_adj_fpatan
EVENT_SINK_AddRef
_adj_fdiv_m32i
_adj_fdivr_m64
__vbaSetSystemError
DllFunctionCall
__vbaFPException
_adj_fdivr_m16i
_adj_fdiv_r
Ord(100)
Ord(534)
_adj_fdiv_m64
__vbaStrCmp
__vbaFreeObj
__vbaHresultCheckObj
_CIsqrt
_CIsin
_CIlog
EVENT_SINK_Release
_adj_fptan
__vbaExceptHandler
__vbaErrorOverflow
_CIatan
__vbaNew2
_adj_fdivr_m32i
_CIexp
_adj_fprem1
_adj_fdivr_m32
_CItan
__vbaFreeStr
_adj_fdiv_m16i
Number of PE resources by type
RT_ICON 8
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
JAPANESE DEFAULT 1
PE resources
ExifTool file metadata
LegalTrademarks
Canon

SubsystemVersion
4.0

Comments
Canon

LinkerVersion
6.0

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Japanese

FileFlagsMask
0x0000

FileDescription
Canon

CharacterSet
Unicode

InitializedDataSize
57344

EntryPoint
0x1194

OriginalFileName
Strkbandagers3.exe

MIMEType
application/octet-stream

LegalCopyright
Canon

FileVersion
1.0

TimeStamp
2017:04:13 01:18:41+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Strkbandagers3

ProductVersion
1.0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Cuffetti

CodeSize
5177344

ProductName
Canon

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 fd3676cd49c9a982e4e0dbcdd2b0035b
SHA1 4db7e9e40c426a770fc9422eff681afb611c3004
SHA256 ef81655351da1e4a43f4feb8f57373ecceff2dd6e80e70a1936ffe55c4ee6246
ssdeep
49152:V4OQlFSUi/4aULesRN4gvj7qUEHB8LX9UCthS7MGtTRN:VHQlFScaULjN4g77o8LX9UC/WpT

authentihash b440a0a35e7ae71b7e73df10a30aec6c98d427153333df3a2cfe9b229b0a1dfd
imphash 14533b8e4443a26cac1ad14d732e603e
File size 5.0 MB ( 5214208 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (90.6%)
Win32 Executable (generic) (4.9%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Tags
peexe

VirusTotal metadata
First submission 2017-04-13 08:53:55 UTC ( 6 months, 1 week ago )
Last submission 2017-08-21 01:54:22 UTC ( 1 month, 4 weeks ago )
File names fd3676cd49c9a982e4e0dbcdd2b0035b.exe
Strkbandagers3.exe
Strkbandagers3
itunes.exe
FD3676CD49C9A982E4E0DBCDD2B0035B
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications