Report - pub1.exe

Raccoon Stealer PE File OS Processor Check PE32
ScreenShot
Created 2021.06.18 10:05 Machine s1_win7_x6402
Filename pub1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
3.6
ZERO API file : malware
VT API (file) 23 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, A + Troj, Kryptik, Static AI, Malicious PE, Racealer, Score, Azorult, ET#78%, RDMK, cmRtazr4qRsfqpC7S9aZ620TpdIf, Ranumbot, susgen, ZexaF, ru0@amMN5VnI)
md5 0c7adaaa32d263c051a72555d85323e9
sha256 f8f92ee2b72e37fbb56e5749dad74857eacbb69d87a23029960bcd4c04370692
ssdeep 6144:tqXtRPThxwG7cLI6Kzh3SeLn39s40TUM7Z8tYQD:MTPNxwG7cLITSeLn3950AWKj
imphash 789f9b51a4c10931fc3f61b83eea1b25
impfuzzy 48:bOBRQPrswQdR3J/8W9jWPlpIJONwaEBcltgJVQX1dzV2fG+1l:qfQPK/ZjwvIJ2EBcltgJVQFdzVk
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x431008 SetVolumeLabelA
 0x43100c OpenFile
 0x431010 SetLocalTime
 0x431014 SetEndOfFile
 0x431018 GetNumberOfConsoleInputEvents
 0x43101c GetCommState
 0x431020 InterlockedDecrement
 0x431024 ScrollConsoleScreenBufferW
 0x431028 GetProfileSectionA
 0x43102c WriteConsoleInputA
 0x431030 SetComputerNameW
 0x431034 GetComputerNameW
 0x431038 CreateDirectoryExA
 0x43103c CallNamedPipeW
 0x431040 GetModuleHandleW
 0x431044 GenerateConsoleCtrlEvent
 0x431048 GetSystemWow64DirectoryA
 0x43104c EnumResourceTypesA
 0x431050 GetDriveTypeA
 0x431054 TlsSetValue
 0x431058 FindResourceExA
 0x43105c GlobalAlloc
 0x431060 AddRefActCtx
 0x431064 GetVolumeInformationA
 0x431068 Sleep
 0x43106c ReadFileScatter
 0x431070 GetConsoleWindow
 0x431074 GetSystemTimeAdjustment
 0x431078 GetVersionExW
 0x43107c InterlockedPopEntrySList
 0x431080 GlobalFlags
 0x431084 Beep
 0x431088 VerifyVersionInfoA
 0x43108c GetBinaryTypeA
 0x431090 TerminateProcess
 0x431094 ReadFile
 0x431098 CompareStringW
 0x43109c GetACP
 0x4310a0 lstrlenW
 0x4310a4 SetConsoleTitleA
 0x4310a8 GlobalUnlock
 0x4310ac EnumResourceNamesW
 0x4310b0 CreateDirectoryA
 0x4310b4 InterlockedExchange
 0x4310b8 GetFileSizeEx
 0x4310bc GetStdHandle
 0x4310c0 FindFirstFileA
 0x4310c4 IsDBCSLeadByteEx
 0x4310c8 GetProcAddress
 0x4310cc WriteProfileSectionA
 0x4310d0 FreeUserPhysicalPages
 0x4310d4 CreateMemoryResourceNotification
 0x4310d8 SearchPathA
 0x4310dc GetPrivateProfileStringA
 0x4310e0 SetFileApisToOEM
 0x4310e4 GetAtomNameA
 0x4310e8 Process32FirstW
 0x4310ec OpenMutexA
 0x4310f0 OpenWaitableTimerW
 0x4310f4 IsSystemResumeAutomatic
 0x4310f8 GetCommMask
 0x4310fc AddAtomA
 0x431100 GetSystemInfo
 0x431104 SetConsoleCursorInfo
 0x431108 CreateIoCompletionPort
 0x43110c WaitCommEvent
 0x431110 GetModuleHandleA
 0x431114 FreeEnvironmentStringsW
 0x431118 GetConsoleTitleW
 0x43111c BuildCommDCBA
 0x431120 GetCurrentDirectoryA
 0x431124 CompareStringA
 0x431128 SetCalendarInfoA
 0x43112c GetWindowsDirectoryW
 0x431130 GetCurrentProcessId
 0x431134 LCMapStringW
 0x431138 CopyFileExA
 0x43113c DeleteFileA
 0x431140 CreateFileA
 0x431144 GetConsoleOutputCP
 0x431148 GetCommandLineW
 0x43114c GetLastError
 0x431150 MoveFileA
 0x431154 GetStartupInfoW
 0x431158 HeapValidate
 0x43115c IsBadReadPtr
 0x431160 RaiseException
 0x431164 EnterCriticalSection
 0x431168 LeaveCriticalSection
 0x43116c GetCurrentProcess
 0x431170 UnhandledExceptionFilter
 0x431174 SetUnhandledExceptionFilter
 0x431178 IsDebuggerPresent
 0x43117c GetModuleFileNameW
 0x431180 DeleteCriticalSection
 0x431184 QueryPerformanceCounter
 0x431188 GetTickCount
 0x43118c GetCurrentThreadId
 0x431190 GetSystemTimeAsFileTime
 0x431194 InterlockedIncrement
 0x431198 ExitProcess
 0x43119c GetEnvironmentStringsW
 0x4311a0 SetHandleCount
 0x4311a4 GetFileType
 0x4311a8 GetStartupInfoA
 0x4311ac TlsGetValue
 0x4311b0 TlsAlloc
 0x4311b4 TlsFree
 0x4311b8 SetLastError
 0x4311bc HeapDestroy
 0x4311c0 HeapCreate
 0x4311c4 HeapFree
 0x4311c8 VirtualFree
 0x4311cc GetModuleFileNameA
 0x4311d0 WriteFile
 0x4311d4 HeapAlloc
 0x4311d8 HeapSize
 0x4311dc HeapReAlloc
 0x4311e0 VirtualAlloc
 0x4311e4 GetOEMCP
 0x4311e8 GetCPInfo
 0x4311ec IsValidCodePage
 0x4311f0 RtlUnwind
 0x4311f4 DebugBreak
 0x4311f8 OutputDebugStringA
 0x4311fc WriteConsoleW
 0x431200 OutputDebugStringW
 0x431204 LoadLibraryW
 0x431208 MultiByteToWideChar
 0x43120c InitializeCriticalSectionAndSpinCount
 0x431210 LoadLibraryA
 0x431214 WideCharToMultiByte
 0x431218 LCMapStringA
 0x43121c GetStringTypeA
 0x431220 GetStringTypeW
 0x431224 GetLocaleInfoA
 0x431228 FlushFileBuffers
 0x43122c GetConsoleCP
 0x431230 GetConsoleMode
 0x431234 SetFilePointer
 0x431238 CloseHandle
 0x43123c SetStdHandle
 0x431240 WriteConsoleA
USER32.dll
 0x431248 GetMenuBarInfo
 0x43124c GetMenuInfo
 0x431250 GetComboBoxInfo
 0x431254 GetMenuCheckMarkDimensions
ADVAPI32.dll
 0x431000 InitiateSystemShutdownW

EAT(Export Address Table) Library

0x426f50 _futurama@4


Similarity measure (PE file only) - Checking for service failure