Report - raccon.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.13 09:42 Machine s1_win7_x6403
Filename raccon.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
1.8
ZERO API file : malware
VT API (file) 26 detected (malicious, high confidence, Stop, Unsafe, Save, Kryptik, Eldorado, Emotet, Sabsik, score, CLASSIC, Static AI, Malicious PE, ZexaF, KuW@aeWCaAbO, Genetic, confidence, 100%, susgen)
md5 e45bef85aabecedb6ba2e4b0aaf7be90
sha256 f0a77a5536afb173fd1fa861ac4e61ef82cb09169fb2e36979a178c6472eaadf
ssdeep 12288:KRsP8WYzMVqoGx7p/ABq7TAG5D/w8vUrEGMRv59CcW5996Nqk:KqFY73X/kqAG5jncriRvbCc6+V
imphash b47655599e49bc4c256f24947d7700bb
impfuzzy 48:8OuBK+jwX1btdPMEeIzIDSfmaEaftgNc+6Hm40IfEi:fu4DX1jPBeIzASfjEaftgNc+F40Ih
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41f000 FileTimeToDosDateTime
 0x41f004 GetNativeSystemInfo
 0x41f008 CopyFileExW
 0x41f00c TlsGetValue
 0x41f010 GetStringTypeA
 0x41f014 SetLocalTime
 0x41f018 HeapAlloc
 0x41f01c SetDllDirectoryW
 0x41f020 InterlockedIncrement
 0x41f024 GetCommState
 0x41f028 ReadConsoleA
 0x41f02c InterlockedDecrement
 0x41f030 GlobalSize
 0x41f034 GetSystemWindowsDirectoryW
 0x41f038 GlobalLock
 0x41f03c SetHandleInformation
 0x41f040 GetProfileSectionA
 0x41f044 CancelWaitableTimer
 0x41f048 GetModuleHandleW
 0x41f04c GetCommandLineA
 0x41f050 ActivateActCtx
 0x41f054 GlobalAlloc
 0x41f058 LoadLibraryW
 0x41f05c TerminateThread
 0x41f060 GetConsoleAliasExesLengthW
 0x41f064 GetCompressedFileSizeA
 0x41f068 GetSystemDirectoryA
 0x41f06c CompareStringW
 0x41f070 lstrlenW
 0x41f074 SetThreadPriority
 0x41f078 WritePrivateProfileStringW
 0x41f07c DeactivateActCtx
 0x41f080 GetNamedPipeHandleStateW
 0x41f084 GetPrivateProfileIntW
 0x41f088 VerifyVersionInfoW
 0x41f08c CreateDirectoryA
 0x41f090 InterlockedExchange
 0x41f094 SetCurrentDirectoryA
 0x41f098 GetStartupInfoA
 0x41f09c GetLastError
 0x41f0a0 GetThreadLocale
 0x41f0a4 ReadConsoleOutputCharacterA
 0x41f0a8 GetProcAddress
 0x41f0ac GetProcessHeaps
 0x41f0b0 SetStdHandle
 0x41f0b4 EnterCriticalSection
 0x41f0b8 DisableThreadLibraryCalls
 0x41f0bc GetPrivateProfileStringA
 0x41f0c0 Process32FirstW
 0x41f0c4 SetSystemTime
 0x41f0c8 SetEnvironmentVariableA
 0x41f0cc GetOEMCP
 0x41f0d0 FindNextFileA
 0x41f0d4 WriteProfileStringA
 0x41f0d8 FindFirstChangeNotificationA
 0x41f0dc QueryMemoryResourceNotification
 0x41f0e0 FreeEnvironmentStringsW
 0x41f0e4 EnumResourceNamesA
 0x41f0e8 WriteProfileStringW
 0x41f0ec GetCurrentDirectoryA
 0x41f0f0 GetCurrentThreadId
 0x41f0f4 GetCPInfoExA
 0x41f0f8 FindAtomW
 0x41f0fc UnregisterWaitEx
 0x41f100 LCMapStringW
 0x41f104 GetVolumeInformationW
 0x41f108 CreateFileA
 0x41f10c GetConsoleOutputCP
 0x41f110 MultiByteToWideChar
 0x41f114 GetStartupInfoW
 0x41f118 HeapValidate
 0x41f11c IsBadReadPtr
 0x41f120 RaiseException
 0x41f124 LeaveCriticalSection
 0x41f128 TerminateProcess
 0x41f12c GetCurrentProcess
 0x41f130 UnhandledExceptionFilter
 0x41f134 SetUnhandledExceptionFilter
 0x41f138 IsDebuggerPresent
 0x41f13c GetModuleFileNameW
 0x41f140 DeleteCriticalSection
 0x41f144 GetACP
 0x41f148 GetCPInfo
 0x41f14c IsValidCodePage
 0x41f150 TlsAlloc
 0x41f154 TlsSetValue
 0x41f158 TlsFree
 0x41f15c SetLastError
 0x41f160 QueryPerformanceCounter
 0x41f164 GetTickCount
 0x41f168 GetCurrentProcessId
 0x41f16c GetSystemTimeAsFileTime
 0x41f170 Sleep
 0x41f174 ExitProcess
 0x41f178 GetEnvironmentStringsW
 0x41f17c GetCommandLineW
 0x41f180 SetHandleCount
 0x41f184 GetStdHandle
 0x41f188 GetFileType
 0x41f18c HeapDestroy
 0x41f190 HeapCreate
 0x41f194 HeapFree
 0x41f198 VirtualFree
 0x41f19c GetModuleFileNameA
 0x41f1a0 WriteFile
 0x41f1a4 HeapSize
 0x41f1a8 HeapReAlloc
 0x41f1ac VirtualAlloc
 0x41f1b0 RtlUnwind
 0x41f1b4 WideCharToMultiByte
 0x41f1b8 DebugBreak
 0x41f1bc OutputDebugStringA
 0x41f1c0 WriteConsoleW
 0x41f1c4 OutputDebugStringW
 0x41f1c8 InitializeCriticalSectionAndSpinCount
 0x41f1cc LCMapStringA
 0x41f1d0 GetStringTypeW
 0x41f1d4 GetLocaleInfoA
 0x41f1d8 LoadLibraryA
 0x41f1dc FlushFileBuffers
 0x41f1e0 GetConsoleCP
 0x41f1e4 GetConsoleMode
 0x41f1e8 SetFilePointer
 0x41f1ec CloseHandle
 0x41f1f0 WriteConsoleA
USER32.dll
 0x41f1f8 GetMenuItemID
WINHTTP.dll
 0x41f200 WinHttpWriteData

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure