Report - kk.exe

Raccoon Stealer PE File OS Processor Check PE32
ScreenShot
Created 2021.06.19 10:01 Machine s1_win7_x6401
Filename kk.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
3.4
ZERO API file : clean
VT API (file) 43 detected (AIDetect, malware2, malicious, high confidence, GenericKD, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, HLKO, PWSX, Zenpak, CLASSIC, A + Troj, DownLoader39, Ranumbot, Racealer, Glupteba, 1JZ87B7, score, MalPE, R426259, ai score=85, Static AI, Malicious PE, ZexaF, ruW@aGxvbvjI, GdSda, susgen)
md5 b557a14d15bdb2a1ec7da60784c61ffe
sha256 2a57c4a71119c2c650be88226592aa09b162044c3a6fe1b84fb527ba433bc65e
ssdeep 6144:T9tCTfmKF75Vbr61KT6LUZS1OFIFhmyfp7tfDB:nCiKF755r63/FsA1xB
imphash 5bc76f4349f7f0afe0c88e229f50d37f
impfuzzy 48:9yOBnCCrHyTdNDkJ/8SeqPlpI62OMwaEBcftgJVQX1dzV2fG+1l:9dtCCAW9ekvIZDEBcftgJVQFdzVI
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x432008 GlobalFix
 0x43200c GetFileSize
 0x432010 OpenFile
 0x432014 SetLocalTime
 0x432018 SetEndOfFile
 0x43201c GetNumberOfConsoleInputEvents
 0x432020 FindResourceExW
 0x432024 GetCommState
 0x432028 InterlockedDecrement
 0x43202c ScrollConsoleScreenBufferW
 0x432030 GetProfileSectionA
 0x432034 WriteConsoleInputA
 0x432038 SetComputerNameW
 0x43203c GetComputerNameW
 0x432040 CallNamedPipeW
 0x432044 GetModuleHandleW
 0x432048 GetSystemWow64DirectoryA
 0x43204c CreateDirectoryExW
 0x432050 GetDriveTypeA
 0x432054 TlsSetValue
 0x432058 GlobalAlloc
 0x43205c AddRefActCtx
 0x432060 GetVolumeInformationA
 0x432064 Sleep
 0x432068 ReadFileScatter
 0x43206c GetSystemTimeAdjustment
 0x432070 GetVersionExW
 0x432074 InterlockedPopEntrySList
 0x432078 GlobalFlags
 0x43207c Beep
 0x432080 VerifyVersionInfoA
 0x432084 GetBinaryTypeA
 0x432088 ReadFile
 0x43208c CompareStringW
 0x432090 GetACP
 0x432094 lstrlenW
 0x432098 GlobalUnlock
 0x43209c GetConsoleOutputCP
 0x4320a0 CreateDirectoryA
 0x4320a4 InterlockedExchange
 0x4320a8 GetStdHandle
 0x4320ac EnumResourceNamesW
 0x4320b0 OpenMutexW
 0x4320b4 IsDBCSLeadByteEx
 0x4320b8 GetProcAddress
 0x4320bc SetVolumeLabelW
 0x4320c0 WriteProfileSectionA
 0x4320c4 FreeUserPhysicalPages
 0x4320c8 CreateMemoryResourceNotification
 0x4320cc SearchPathA
 0x4320d0 GetPrivateProfileStringA
 0x4320d4 SetFileApisToOEM
 0x4320d8 GetAtomNameA
 0x4320dc Process32FirstW
 0x4320e0 OpenWaitableTimerW
 0x4320e4 IsSystemResumeAutomatic
 0x4320e8 GetCommMask
 0x4320ec AddAtomA
 0x4320f0 GetSystemInfo
 0x4320f4 SetSystemTime
 0x4320f8 EnumResourceTypesW
 0x4320fc SetConsoleCursorInfo
 0x432100 CreateIoCompletionPort
 0x432104 WaitCommEvent
 0x432108 SetConsoleTitleW
 0x43210c GetModuleHandleA
 0x432110 FreeEnvironmentStringsW
 0x432114 GetConsoleTitleW
 0x432118 BuildCommDCBA
 0x43211c GetCurrentDirectoryA
 0x432120 CompareStringA
 0x432124 SetCalendarInfoA
 0x432128 GetWindowsDirectoryW
 0x43212c GetCurrentProcessId
 0x432130 SuspendThread
 0x432134 LCMapStringW
 0x432138 CopyFileExA
 0x43213c DeleteFileA
 0x432140 CreateFileA
 0x432144 FindFirstFileA
 0x432148 GetCommandLineW
 0x43214c GetLastError
 0x432150 MoveFileA
 0x432154 GetStartupInfoW
 0x432158 HeapValidate
 0x43215c IsBadReadPtr
 0x432160 RaiseException
 0x432164 EnterCriticalSection
 0x432168 LeaveCriticalSection
 0x43216c TerminateProcess
 0x432170 GetCurrentProcess
 0x432174 UnhandledExceptionFilter
 0x432178 SetUnhandledExceptionFilter
 0x43217c IsDebuggerPresent
 0x432180 GetModuleFileNameW
 0x432184 DeleteCriticalSection
 0x432188 QueryPerformanceCounter
 0x43218c GetTickCount
 0x432190 GetCurrentThreadId
 0x432194 GetSystemTimeAsFileTime
 0x432198 InterlockedIncrement
 0x43219c ExitProcess
 0x4321a0 GetEnvironmentStringsW
 0x4321a4 SetHandleCount
 0x4321a8 GetFileType
 0x4321ac GetStartupInfoA
 0x4321b0 TlsGetValue
 0x4321b4 TlsAlloc
 0x4321b8 TlsFree
 0x4321bc SetLastError
 0x4321c0 HeapDestroy
 0x4321c4 HeapCreate
 0x4321c8 HeapFree
 0x4321cc VirtualFree
 0x4321d0 GetModuleFileNameA
 0x4321d4 WriteFile
 0x4321d8 HeapAlloc
 0x4321dc HeapSize
 0x4321e0 HeapReAlloc
 0x4321e4 VirtualAlloc
 0x4321e8 GetOEMCP
 0x4321ec GetCPInfo
 0x4321f0 IsValidCodePage
 0x4321f4 RtlUnwind
 0x4321f8 DebugBreak
 0x4321fc OutputDebugStringA
 0x432200 WriteConsoleW
 0x432204 OutputDebugStringW
 0x432208 LoadLibraryW
 0x43220c MultiByteToWideChar
 0x432210 InitializeCriticalSectionAndSpinCount
 0x432214 LoadLibraryA
 0x432218 WideCharToMultiByte
 0x43221c LCMapStringA
 0x432220 GetStringTypeA
 0x432224 GetStringTypeW
 0x432228 GetLocaleInfoA
 0x43222c FlushFileBuffers
 0x432230 GetConsoleCP
 0x432234 GetConsoleMode
 0x432238 SetFilePointer
 0x43223c CloseHandle
 0x432240 SetStdHandle
 0x432244 WriteConsoleA
USER32.dll
 0x43224c GetMenuBarInfo
 0x432250 GetMenuInfo
 0x432254 GetComboBoxInfo
 0x432258 GetListBoxInfo
ADVAPI32.dll
 0x432000 InitiateSystemShutdownW

EAT(Export Address Table) Library

0x427160 _futurama@4


Similarity measure (PE file only) - Checking for service failure