Report - sefile.exe

Raccoon Stealer PE File OS Processor Check PE32
ScreenShot
Created 2021.06.18 17:41 Machine s1_win7_x6401
Filename sefile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
3.0
ZERO API file : malware
VT API (file) 29 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, ZexaF, yu0@aqGW0LnI, Kryptik, Eldorado, Attribute, HighConfidence, PWSX, A + Troj, Static AI, Malicious PE, Racealer, Azorult, score, ET#76%, RDMK, cmRtazqdommCCt2ZYdTx, VbuyZ2f, Ranumbot, susgen, confidence, 100%)
md5 06ac95deaa340711db9f10e66642fdb4
sha256 26fbc6a8864ad5ff42b549a9a7b3dbc4cf6b20d57b4942e010ad637530953ab7
ssdeep 6144:5WNFDH3wvbpb8DM4jgJptYLenYK7AAShi/o7XGWeuAghtZZE6:SFb3wvbpb8DMhQenYKL0/WWe3Eh
imphash 0e61e5ee811a73c290e64659dd192375
impfuzzy 48:bOBRQPrswpdR3J/8W9kWPlp5JOqwaEBcltgJVQXhdzV2fG+1z:qfQP1/Zkwv5JJEBcltgJVQxdzVy
  Network IP location

Signature (7cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44a008 SetVolumeLabelA
 0x44a00c OpenFile
 0x44a010 SetLocalTime
 0x44a014 SetEndOfFile
 0x44a018 GetNumberOfConsoleInputEvents
 0x44a01c GetCommState
 0x44a020 InterlockedDecrement
 0x44a024 ScrollConsoleScreenBufferW
 0x44a028 GetProfileSectionA
 0x44a02c WriteConsoleInputA
 0x44a030 SetComputerNameW
 0x44a034 GetComputerNameW
 0x44a038 CreateDirectoryExA
 0x44a03c CallNamedPipeW
 0x44a040 GetModuleHandleW
 0x44a044 GenerateConsoleCtrlEvent
 0x44a048 GetSystemWow64DirectoryA
 0x44a04c EnumResourceTypesA
 0x44a050 GetDriveTypeA
 0x44a054 TlsSetValue
 0x44a058 FindResourceExA
 0x44a05c GlobalAlloc
 0x44a060 AddRefActCtx
 0x44a064 GetVolumeInformationA
 0x44a068 Sleep
 0x44a06c ReadFileScatter
 0x44a070 GetConsoleWindow
 0x44a074 GetSystemTimeAdjustment
 0x44a078 GetVersionExW
 0x44a07c InterlockedPopEntrySList
 0x44a080 GlobalFlags
 0x44a084 Beep
 0x44a088 VerifyVersionInfoA
 0x44a08c GetBinaryTypeA
 0x44a090 TerminateProcess
 0x44a094 ReadFile
 0x44a098 CompareStringW
 0x44a09c lstrlenW
 0x44a0a0 SetConsoleTitleA
 0x44a0a4 GlobalUnlock
 0x44a0a8 GetConsoleOutputCP
 0x44a0ac EnumResourceNamesW
 0x44a0b0 InterlockedExchange
 0x44a0b4 GetFileSizeEx
 0x44a0b8 GetStdHandle
 0x44a0bc FindFirstFileA
 0x44a0c0 IsDBCSLeadByteEx
 0x44a0c4 GetProcAddress
 0x44a0c8 WriteProfileSectionA
 0x44a0cc FreeUserPhysicalPages
 0x44a0d0 CreateMemoryResourceNotification
 0x44a0d4 SearchPathA
 0x44a0d8 GetPrivateProfileStringA
 0x44a0dc SetFileApisToOEM
 0x44a0e0 GetAtomNameA
 0x44a0e4 Process32FirstW
 0x44a0e8 OpenMutexA
 0x44a0ec OpenWaitableTimerW
 0x44a0f0 SetCalendarInfoW
 0x44a0f4 IsSystemResumeAutomatic
 0x44a0f8 GetCommMask
 0x44a0fc AddAtomA
 0x44a100 GetSystemInfo
 0x44a104 GetOEMCP
 0x44a108 SetConsoleCursorInfo
 0x44a10c CreateIoCompletionPort
 0x44a110 WaitCommEvent
 0x44a114 GetModuleHandleA
 0x44a118 FreeEnvironmentStringsW
 0x44a11c GetConsoleTitleW
 0x44a120 BuildCommDCBA
 0x44a124 GetCurrentDirectoryA
 0x44a128 CompareStringA
 0x44a12c GetWindowsDirectoryW
 0x44a130 GetCurrentProcessId
 0x44a134 LCMapStringW
 0x44a138 CopyFileExA
 0x44a13c DeleteFileA
 0x44a140 CreateFileA
 0x44a144 CreateDirectoryA
 0x44a148 GetCommandLineW
 0x44a14c GetLastError
 0x44a150 MoveFileA
 0x44a154 GetStartupInfoW
 0x44a158 HeapValidate
 0x44a15c IsBadReadPtr
 0x44a160 RaiseException
 0x44a164 EnterCriticalSection
 0x44a168 LeaveCriticalSection
 0x44a16c GetCurrentProcess
 0x44a170 UnhandledExceptionFilter
 0x44a174 SetUnhandledExceptionFilter
 0x44a178 IsDebuggerPresent
 0x44a17c GetModuleFileNameW
 0x44a180 DeleteCriticalSection
 0x44a184 QueryPerformanceCounter
 0x44a188 GetTickCount
 0x44a18c GetCurrentThreadId
 0x44a190 GetSystemTimeAsFileTime
 0x44a194 InterlockedIncrement
 0x44a198 ExitProcess
 0x44a19c GetEnvironmentStringsW
 0x44a1a0 SetHandleCount
 0x44a1a4 GetFileType
 0x44a1a8 GetStartupInfoA
 0x44a1ac TlsGetValue
 0x44a1b0 TlsAlloc
 0x44a1b4 TlsFree
 0x44a1b8 SetLastError
 0x44a1bc HeapDestroy
 0x44a1c0 HeapCreate
 0x44a1c4 HeapFree
 0x44a1c8 VirtualFree
 0x44a1cc GetModuleFileNameA
 0x44a1d0 WriteFile
 0x44a1d4 HeapAlloc
 0x44a1d8 HeapSize
 0x44a1dc HeapReAlloc
 0x44a1e0 VirtualAlloc
 0x44a1e4 GetACP
 0x44a1e8 GetCPInfo
 0x44a1ec IsValidCodePage
 0x44a1f0 RtlUnwind
 0x44a1f4 DebugBreak
 0x44a1f8 OutputDebugStringA
 0x44a1fc WriteConsoleW
 0x44a200 OutputDebugStringW
 0x44a204 LoadLibraryW
 0x44a208 MultiByteToWideChar
 0x44a20c InitializeCriticalSectionAndSpinCount
 0x44a210 LoadLibraryA
 0x44a214 WideCharToMultiByte
 0x44a218 LCMapStringA
 0x44a21c GetStringTypeA
 0x44a220 GetStringTypeW
 0x44a224 GetLocaleInfoA
 0x44a228 FlushFileBuffers
 0x44a22c GetConsoleCP
 0x44a230 GetConsoleMode
 0x44a234 SetFilePointer
 0x44a238 CloseHandle
 0x44a23c SetStdHandle
 0x44a240 WriteConsoleA
USER32.dll
 0x44a248 GetMenuBarInfo
 0x44a24c GetMenuInfo
 0x44a250 GetComboBoxInfo
 0x44a254 GetMenuCheckMarkDimensions
ADVAPI32.dll
 0x44a000 InitiateSystemShutdownA

EAT(Export Address Table) Library

0x43f770 _CallPattern@8
0x43f750 _futurama@4
0x43f760 _zabiray@8


Similarity measure (PE file only) - Checking for service failure