Summary | ZeroBOX

chromium.exe

Malicious Library UPX PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us July 28, 2023, 5:36 p.m. July 28, 2023, 5:45 p.m.
Size 420.2KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 71bc10004d1b0408375de806d4530983
SHA256 e507395aaccab20998986f9faee7d557014aa7fc9adf3a856d54b52962797a4f
CRC32 41E89E73
ssdeep 6144:6Be337n8xkABZYQkh6IdqIk4FxcXJ9KCiexJEII9otc3iGFGC8:37LABZYQkh6IdW6wKCpxJm9o+yGFl8
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2052
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10004000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 46514176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03b70000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nsrC4A4.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nsrC4A4.tmp\System.dll
Bkav W32.AIDetectMalware
CrowdStrike win/malicious_confidence_90% (W)
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Guloader.gen
TrendMicro Trojan.Win32.GULOADER.YXDG2Z
McAfee-GW-Edition Artemis
Trapmine suspicious.low.ml.score
ZoneAlarm HEUR:Trojan.Win32.Guloader.gen
Malwarebytes Trojan.GuLoader.NSIS
TrendMicro-HouseCall Trojan.Win32.GULOADER.YXDG2Z
DeepInstinct MALICIOUS