Report - vbc.exe

Raccoon Stealer Generic Malware UPX PWS[m] ScreenShot AntiDebug AntiVM PE File PE32
ScreenShot
Created 2023.05.17 09:14 Machine s1_win7_x6401
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
8.0
ZERO API file : malware
VT API (file) 45 detected (AIDetectMalware, 9m1@eWgPnPk, Vy7z, malicious, confidence, Attribute, HighConfidence, high confidence, ESYI, score, Mokes, aqct, InjectorX, SmokeLoader, cqjou, Artemis, high, ai score=88, Sabsik, Casdet, Detected, BScope, TrojanPSW, Stelega, unsafe, Chgt, R002H09EG23, CLASSIC, PossibleThreat, FORTIEDR)
md5 bc8dfcb4093f0bb356e3103af15f3d1b
sha256 7f016599bc5b598d9ba9f8e869a36e0c128bc6bbccffb391b05993b62ca71baa
ssdeep 12288:yoHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD:yo0odC3lMHiEptXW+xVW8MeH
imphash 622a88682c24693792ff46e3135c6d5e
impfuzzy 48:mv1z/1wzwZQwgPwbbV2pgkzRxW3Yl39w6pFqHr+1SJXI4TU2FNmWcFpAhHpw+8x1:m9z/1GwZQfPubopgkzRxWuNvpFqHr+we
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Detects Avast Antivirus through the presence of a library
watch One or more of the buffers contains an embedded PE file
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Tries to unhook Windows functions monitored by Cuckoo
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice One or more potentially interesting buffers were extracted
notice Potentially malicious URLs were found in the process memory dump
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (16cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Generic_PWS_Memory_Zero PWS Memory memory
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vba (no description) memory
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.DLL
 0xfa31000 CryptAcquireContextW
 0xfa31004 CryptDeriveKey
KERNEL32.DLL
 0xfa3100c VirtualProtect
 0xfa31010 CreateFileW
 0xfa31014 Sleep
 0xfa31018 GetTickCount
 0xfa3101c WriteFile
 0xfa31020 RtlFillMemory
MSVBVM60.DLL
 0xfa31028 None
 0xfa3102c __vbaStrI2
 0xfa31030 _CIcos
 0xfa31034 _adj_fptan
 0xfa31038 __vbaVarMove
 0xfa3103c __vbaVarVargNofree
 0xfa31040 __vbaFreeVar
 0xfa31044 __vbaLineInputStr
 0xfa31048 __vbaLenBstr
 0xfa3104c __vbaStrVarMove
 0xfa31050 __vbaFreeVarList
 0xfa31054 _adj_fdiv_m64
 0xfa31058 __vbaFreeObjList
 0xfa3105c __vbaStrErrVarCopy
 0xfa31060 _adj_fprem1
 0xfa31064 __vbaVarCmpNe
 0xfa31068 __vbaStrCat
 0xfa3106c __vbaSetSystemError
 0xfa31070 __vbaRecDestruct
 0xfa31074 __vbaHresultCheckObj
 0xfa31078 _adj_fdiv_m32
 0xfa3107c __vbaAryDestruct
 0xfa31080 None
 0xfa31084 None
 0xfa31088 __vbaObjSet
 0xfa3108c None
 0xfa31090 _adj_fdiv_m16i
 0xfa31094 __vbaObjSetAddref
 0xfa31098 _adj_fdivr_m16i
 0xfa3109c __vbaBoolVarNull
 0xfa310a0 __vbaRefVarAry
 0xfa310a4 _CIsin
 0xfa310a8 __vbaErase
 0xfa310ac __vbaVarZero
 0xfa310b0 __vbaVarCmpGt
 0xfa310b4 __vbaChkstk
 0xfa310b8 __vbaFileClose
 0xfa310bc None
 0xfa310c0 EVENT_SINK_AddRef
 0xfa310c4 __vbaStrCmp
 0xfa310c8 __vbaVarTstEq
 0xfa310cc None
 0xfa310d0 DllFunctionCall
 0xfa310d4 __vbaVarOr
 0xfa310d8 __vbaRedimPreserve
 0xfa310dc _adj_fpatan
 0xfa310e0 __vbaRedim
 0xfa310e4 EVENT_SINK_Release
 0xfa310e8 _CIsqrt
 0xfa310ec EVENT_SINK_QueryInterface
 0xfa310f0 __vbaExceptHandler
 0xfa310f4 None
 0xfa310f8 _adj_fprem
 0xfa310fc _adj_fdivr_m64
 0xfa31100 None
 0xfa31104 None
 0xfa31108 __vbaFPException
 0xfa3110c __vbaStrVarVal
 0xfa31110 __vbaUbound
 0xfa31114 __vbaVarCat
 0xfa31118 None
 0xfa3111c None
 0xfa31120 _CIlog
 0xfa31124 __vbaFileOpen
 0xfa31128 __vbaNew2
 0xfa3112c None
 0xfa31130 None
 0xfa31134 _adj_fdiv_m32i
 0xfa31138 _adj_fdivr_m32i
 0xfa3113c __vbaStrCopy
 0xfa31140 __vbaI4Str
 0xfa31144 __vbaVarNot
 0xfa31148 __vbaFreeStrList
 0xfa3114c _adj_fdivr_m32
 0xfa31150 _adj_fdiv_r
 0xfa31154 None
 0xfa31158 __vbaI4Var
 0xfa3115c None
 0xfa31160 __vbaAryLock
 0xfa31164 __vbaVarDup
 0xfa31168 __vbaVarCopy
 0xfa3116c None
 0xfa31170 _CIatan
 0xfa31174 __vbaCastObj
 0xfa31178 __vbaStrMove
 0xfa3117c __vbaR8IntI4
 0xfa31180 _allmul
 0xfa31184 __vbaLenVarB
 0xfa31188 _CItan
 0xfa3118c __vbaAryUnlock
 0xfa31190 _CIexp
 0xfa31194 __vbaFreeObj
 0xfa31198 __vbaFreeStr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure