Report - rollerkind.exe

Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2021.10.08 11:36 Machine s1_win7_x6401
Filename rollerkind.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
1.8
ZERO API file : malware
VT API (file) 19 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, Attribute, HighConfidence, Ranumbot, Score, Sabsik, Generic@ML, RDML, 1gN8MlHKEKaK2RoQlu06TQ, Static AI, Malicious PE, confidence)
md5 13125b46122981864bd9f93b018ff04a
sha256 468dfca11764f8455465bd5bacbc136edf3ad29d89552f97784435271c97eea7
ssdeep 12288:l2tOJdUPKwdstT0HS3IjD+aEyWBGdHtttRquChVW:l2tOrwdp+FyMotRJ
imphash be06676f0b26f3557b735abbe8be48ec
impfuzzy 24:bhkE1u/8UrFdEDGOWz5rbRk1bkfcjlpOqGXldtsFHRyvpJ3vT0ZrtjMnR:bh8/v5dsmZfcaqGXDtsErvAZo
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x47d000 HeapReAlloc
 0x47d004 lstrlenA
 0x47d008 GetLocaleInfoA
 0x47d00c EndUpdateResourceW
 0x47d010 GetQueuedCompletionStatus
 0x47d014 SetEvent
 0x47d018 BackupSeek
 0x47d01c GetConsoleTitleA
 0x47d020 ReadConsoleW
 0x47d024 WriteFile
 0x47d028 CreateActCtxW
 0x47d02c InitializeCriticalSection
 0x47d030 GetEnvironmentStrings
 0x47d034 InitAtomTable
 0x47d038 HeapDestroy
 0x47d03c FindNextVolumeW
 0x47d040 IsProcessorFeaturePresent
 0x47d044 GetFileAttributesW
 0x47d048 GetModuleFileNameW
 0x47d04c DeactivateActCtx
 0x47d050 InterlockedExchange
 0x47d054 GetProcAddress
 0x47d058 BeginUpdateResourceW
 0x47d05c PrepareTape
 0x47d060 GetProcessVersion
 0x47d064 WriteConsoleA
 0x47d068 LocalAlloc
 0x47d06c RemoveDirectoryW
 0x47d070 SetConsoleWindowInfo
 0x47d074 GetModuleHandleA
 0x47d078 VirtualProtect
 0x47d07c SetProcessShutdownParameters
 0x47d080 ReleaseMutex
 0x47d084 GetCurrentProcessId
 0x47d088 FindNextVolumeA
 0x47d08c lstrcpyA
 0x47d090 WriteConsoleW
 0x47d094 ReadFile
 0x47d098 WideCharToMultiByte
 0x47d09c InterlockedIncrement
 0x47d0a0 InterlockedDecrement
 0x47d0a4 InterlockedCompareExchange
 0x47d0a8 MultiByteToWideChar
 0x47d0ac GetStringTypeW
 0x47d0b0 EncodePointer
 0x47d0b4 DecodePointer
 0x47d0b8 Sleep
 0x47d0bc DeleteCriticalSection
 0x47d0c0 EnterCriticalSection
 0x47d0c4 LeaveCriticalSection
 0x47d0c8 GetLastError
 0x47d0cc HeapFree
 0x47d0d0 GetCommandLineW
 0x47d0d4 HeapSetInformation
 0x47d0d8 GetStartupInfoW
 0x47d0dc GetCPInfo
 0x47d0e0 RaiseException
 0x47d0e4 RtlUnwind
 0x47d0e8 HeapAlloc
 0x47d0ec LCMapStringW
 0x47d0f0 HeapCreate
 0x47d0f4 InitializeCriticalSectionAndSpinCount
 0x47d0f8 UnhandledExceptionFilter
 0x47d0fc SetUnhandledExceptionFilter
 0x47d100 IsDebuggerPresent
 0x47d104 TerminateProcess
 0x47d108 GetCurrentProcess
 0x47d10c SetFilePointer
 0x47d110 GetModuleHandleW
 0x47d114 ExitProcess
 0x47d118 GetStdHandle
 0x47d11c FreeEnvironmentStringsW
 0x47d120 GetEnvironmentStringsW
 0x47d124 SetHandleCount
 0x47d128 GetFileType
 0x47d12c TlsAlloc
 0x47d130 TlsGetValue
 0x47d134 TlsSetValue
 0x47d138 TlsFree
 0x47d13c SetLastError
 0x47d140 GetCurrentThreadId
 0x47d144 QueryPerformanceCounter
 0x47d148 GetTickCount
 0x47d14c GetSystemTimeAsFileTime
 0x47d150 GetLocaleInfoW
 0x47d154 HeapSize
 0x47d158 GetACP
 0x47d15c GetOEMCP
 0x47d160 IsValidCodePage
 0x47d164 GetUserDefaultLCID
 0x47d168 EnumSystemLocalesA
 0x47d16c IsValidLocale
 0x47d170 CloseHandle
 0x47d174 CreateFileA
 0x47d178 SetStdHandle
 0x47d17c GetConsoleCP
 0x47d180 GetConsoleMode
 0x47d184 FlushFileBuffers
 0x47d188 LoadLibraryW
 0x47d18c SetEndOfFile
 0x47d190 GetProcessHeap
 0x47d194 CreateFileW

EAT(Export Address Table) Library

0x4015d6 @GetFirstVice@8
0x4015df @SetViceVariants@12


Similarity measure (PE file only) - Checking for service failure