Report - svch.exe

Raccoon Stealer Glupteba PE File OS Processor Check PE32
ScreenShot
Created 2021.05.25 10:00 Machine s1_win7_x6402
Filename svch.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
3.6
ZERO API file : malware
VT API (file) 37 detected (AIDetect, malware2, malicious, high confidence, GenericKDZ, Artemis, Save, confidence, 100%, Attribute, HighConfidence, Kryptik, HLAB, Tofsee, FileRepMalware, Auto, R + Mal, GandCrypt, Static AI, Malicious PE, FormBook, BU8ONU, Unsafe, Score, ai score=82, Convagent, Azorult, MalPE, R422236, R002H0CEO21, CLOUD, Nymaim, HLAA, ZexaF, zuX@aOqWEWx)
md5 13023b4453e98378bf05047bd0bbb9f8
sha256 36b5ddc5914b203b4213ad5cc15cc498ad16691d84fb239220331fc83503e76d
ssdeep 6144:MKL0e5f1XMELk0YVYISuhA9VxoFVGMZud83+xcb88O5lDNNq992XsTRV:MKL0e5f1XxTYVdNA9/If6xllNc/2XsL
imphash 40bba328aeeb86af0602a23d2610bb0c
impfuzzy 48:jSMpgcO1WprIOY3J8a1eeM9FmFxabhX8uAK9SBcBRpRBg:jSMFnprze5MvHbhX8uAQSBcBRpQ
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
danger Trojan_Win32_Glupteba_1_Zero Trojan Win32 Glupteba binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x421000 GetPrivateProfileSectionNamesW
 0x421004 EnumResourceNamesW
 0x421008 SetVolumeLabelA
 0x42100c GetFileSize
 0x421010 lstrlenA
 0x421014 GetDriveTypeW
 0x421018 SetEndOfFile
 0x42101c LoadResource
 0x421020 ScrollConsoleScreenBufferW
 0x421024 GlobalSize
 0x421028 GetProfileSectionA
 0x42102c WaitForSingleObject
 0x421030 WriteConsoleInputA
 0x421034 SignalObjectAndWait
 0x421038 AddConsoleAliasW
 0x42103c SetVolumeMountPointW
 0x421040 FindFirstFileExW
 0x421044 GetProcessPriorityBoost
 0x421048 GetTickCount
 0x42104c GetCurrentThread
 0x421050 GetConsoleAliasesLengthA
 0x421054 GetPrivateProfileStringW
 0x421058 EnumTimeFormatsW
 0x42105c GetUserDefaultLangID
 0x421060 SetCommState
 0x421064 SetProcessPriorityBoost
 0x421068 TlsSetValue
 0x42106c FindResourceExA
 0x421070 GetVolumeInformationA
 0x421074 LoadLibraryW
 0x421078 GetConsoleMode
 0x42107c TerminateThread
 0x421080 GetPrivateProfileStructW
 0x421084 GetSystemPowerStatus
 0x421088 GetFileAttributesA
 0x42108c SetConsoleCursorPosition
 0x421090 WriteConsoleW
 0x421094 WritePrivateProfileSectionW
 0x421098 IsDBCSLeadByte
 0x42109c GetTimeZoneInformation
 0x4210a0 DeactivateActCtx
 0x4210a4 CreateJobObjectA
 0x4210a8 FillConsoleOutputCharacterW
 0x4210ac GetLastError
 0x4210b0 SetLastError
 0x4210b4 GetProcAddress
 0x4210b8 WriteProfileSectionA
 0x4210bc SetStdHandle
 0x4210c0 SetComputerNameA
 0x4210c4 OpenWaitableTimerA
 0x4210c8 OpenThread
 0x4210cc OpenMutexA
 0x4210d0 LocalAlloc
 0x4210d4 DeleteTimerQueue
 0x4210d8 MoveFileA
 0x4210dc GetProfileStringA
 0x4210e0 AddAtomA
 0x4210e4 WaitForMultipleObjects
 0x4210e8 WTSGetActiveConsoleSessionId
 0x4210ec GetThreadPriority
 0x4210f0 DebugSetProcessKillOnExit
 0x4210f4 GetModuleHandleA
 0x4210f8 RequestWakeupLatency
 0x4210fc WaitForDebugEvent
 0x421100 ScrollConsoleScreenBufferA
 0x421104 DuplicateHandle
 0x421108 SetProcessShutdownParameters
 0x42110c OpenSemaphoreW
 0x421110 ReleaseMutex
 0x421114 LocalSize
 0x421118 FindAtomW
 0x42111c DebugBreak
 0x421120 ReadConsoleOutputCharacterW
 0x421124 CommConfigDialogW
 0x421128 CloseHandle
 0x42112c CreateFileW
 0x421130 GetCommandLineA
 0x421134 HeapSetInformation
 0x421138 GetStartupInfoW
 0x42113c EncodePointer
 0x421140 DecodePointer
 0x421144 IsProcessorFeaturePresent
 0x421148 HeapValidate
 0x42114c IsBadReadPtr
 0x421150 SetUnhandledExceptionFilter
 0x421154 QueryPerformanceCounter
 0x421158 GetCurrentThreadId
 0x42115c GetCurrentProcessId
 0x421160 GetSystemTimeAsFileTime
 0x421164 InterlockedIncrement
 0x421168 InterlockedDecrement
 0x42116c GetModuleHandleW
 0x421170 ExitProcess
 0x421174 GetModuleFileNameA
 0x421178 FreeEnvironmentStringsW
 0x42117c WideCharToMultiByte
 0x421180 GetEnvironmentStringsW
 0x421184 SetHandleCount
 0x421188 GetStdHandle
 0x42118c InitializeCriticalSectionAndSpinCount
 0x421190 GetFileType
 0x421194 DeleteCriticalSection
 0x421198 TlsAlloc
 0x42119c TlsGetValue
 0x4211a0 TlsFree
 0x4211a4 HeapCreate
 0x4211a8 GetModuleFileNameW
 0x4211ac WriteFile
 0x4211b0 RaiseException
 0x4211b4 EnterCriticalSection
 0x4211b8 LeaveCriticalSection
 0x4211bc HeapAlloc
 0x4211c0 HeapReAlloc
 0x4211c4 HeapSize
 0x4211c8 HeapQueryInformation
 0x4211cc TerminateProcess
 0x4211d0 GetCurrentProcess
 0x4211d4 UnhandledExceptionFilter
 0x4211d8 IsDebuggerPresent
 0x4211dc HeapFree
 0x4211e0 GetACP
 0x4211e4 GetOEMCP
 0x4211e8 GetCPInfo
 0x4211ec IsValidCodePage
 0x4211f0 RtlUnwind
 0x4211f4 OutputDebugStringA
 0x4211f8 OutputDebugStringW
 0x4211fc LCMapStringW
 0x421200 MultiByteToWideChar
 0x421204 GetStringTypeW
 0x421208 SetFilePointer
 0x42120c GetConsoleCP
 0x421210 FlushFileBuffers
USER32.dll
 0x421218 GetMessageTime
 0x42121c GetListBoxInfo

EAT(Export Address Table) Library

0x41f0d0 _CallPattern@8
0x41f0b0 _futurama@4
0x41f0c0 _go@4
0x41f0a0 _hiduk@8


Similarity measure (PE file only) - Checking for service failure