Report - chrome.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.04 14:18 Machine s1_win7_x6402
Filename chrome.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.6
ZERO API file : malware
VT API (file) 51 detected (AIDetect, malware2, Chapak, malicious, high confidence, DownLoader41, GenericKD, Unsafe, Save, confidence, Kryptik, ZexaF, VqX@aumi, Eldorado, HMHH, Raccoon, goydfx, MalwareX, Ljag, S + Troj, Krypt, Emotet, Azorult, Score, AGEN, GenericMC, Racoon, MalPE, R439609, ai score=83, Sabsik, Obscure, CLASSIC, D9gaZS6zew4, Static AI, Malicious PE, susgen, GenKryptik, FJXI, GdSda)
md5 30b21677cf7a267da2ef6daff813d054
sha256 98b5264d43dd36905b4383d8851a97d54fd985713885f6a17edf0b10b6737172
ssdeep 12288:Ekeom883TT3WgpDtz8LIqh8Zs94Ch3POefjfH5dDhj0uxh+Ao/xYm2F5Vk2T:zeom82Ltz8Qs94Ch3POeTHFguxhCxYmi
imphash f536c766660697a0f33f0299d3f205dd
impfuzzy 24:QgkN/rnSjV4WHsOcOovaV4rMckHh6dPv5UbDmTfHgWM6O0hOmgafPvPjM1KfJbtq:Qgo+EODV6dPBeghOmgafnAYthS7xOdU
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x425000 EnumResourceNamesW
 0x425004 GetFileSize
 0x425008 GetNativeSystemInfo
 0x42500c lstrlenA
 0x425010 GetStringTypeA
 0x425014 SetLocalTime
 0x425018 FindResourceExW
 0x42501c GetQueuedCompletionStatus
 0x425020 InterlockedDecrement
 0x425024 GetNamedPipeHandleStateA
 0x425028 GlobalLock
 0x42502c FreeEnvironmentStringsA
 0x425030 GetModuleHandleW
 0x425034 GetTickCount
 0x425038 IsBadReadPtr
 0x42503c GetSystemTimeAsFileTime
 0x425040 GetPrivateProfileStringW
 0x425044 ReadConsoleW
 0x425048 WriteFile
 0x42504c SetCommState
 0x425050 GetCommandLineA
 0x425054 GlobalAlloc
 0x425058 GetPrivateProfileIntA
 0x42505c LoadLibraryW
 0x425060 GetSystemWindowsDirectoryA
 0x425064 GetConsoleAliasExesLengthW
 0x425068 IsDBCSLeadByte
 0x42506c ReadFile
 0x425070 GetStartupInfoW
 0x425074 GlobalUnlock
 0x425078 LCMapStringA
 0x42507c InterlockedExchange
 0x425080 SetCurrentDirectoryA
 0x425084 GetStartupInfoA
 0x425088 GetCPInfoExW
 0x42508c GetLastError
 0x425090 ReadConsoleOutputCharacterA
 0x425094 GetProcAddress
 0x425098 VirtualAlloc
 0x42509c WriteProfileSectionA
 0x4250a0 CopyFileA
 0x4250a4 LoadLibraryA
 0x4250a8 CreateSemaphoreW
 0x4250ac HeapWalk
 0x4250b0 FindAtomA
 0x4250b4 Process32NextW
 0x4250b8 CreateIoCompletionPort
 0x4250bc FreeEnvironmentStringsW
 0x4250c0 EnumResourceNamesA
 0x4250c4 GetCurrentThreadId
 0x4250c8 TlsAlloc
 0x4250cc DeleteFileW
 0x4250d0 CopyFileExA
 0x4250d4 MultiByteToWideChar
 0x4250d8 HeapValidate
 0x4250dc RaiseException
 0x4250e0 LeaveCriticalSection
 0x4250e4 EnterCriticalSection
 0x4250e8 SetStdHandle
 0x4250ec GetFileType
 0x4250f0 WideCharToMultiByte
 0x4250f4 GetConsoleCP
 0x4250f8 GetConsoleMode
 0x4250fc DeleteCriticalSection
 0x425100 GetModuleFileNameW
 0x425104 InterlockedIncrement
 0x425108 GetACP
 0x42510c GetOEMCP
 0x425110 GetCPInfo
 0x425114 IsValidCodePage
 0x425118 TlsGetValue
 0x42511c TlsSetValue
 0x425120 TlsFree
 0x425124 SetLastError
 0x425128 UnhandledExceptionFilter
 0x42512c SetUnhandledExceptionFilter
 0x425130 QueryPerformanceCounter
 0x425134 GetCurrentProcessId
 0x425138 Sleep
 0x42513c ExitProcess
 0x425140 GetModuleFileNameA
 0x425144 GetEnvironmentStrings
 0x425148 GetEnvironmentStringsW
 0x42514c SetHandleCount
 0x425150 GetStdHandle
 0x425154 HeapDestroy
 0x425158 HeapCreate
 0x42515c HeapFree
 0x425160 VirtualFree
 0x425164 HeapAlloc
 0x425168 TerminateProcess
 0x42516c GetCurrentProcess
 0x425170 IsDebuggerPresent
 0x425174 HeapSize
 0x425178 HeapReAlloc
 0x42517c InitializeCriticalSectionAndSpinCount
 0x425180 WriteConsoleA
 0x425184 GetConsoleOutputCP
 0x425188 WriteConsoleW
 0x42518c SetFilePointer
 0x425190 RtlUnwind
 0x425194 DebugBreak
 0x425198 OutputDebugStringA
 0x42519c OutputDebugStringW
 0x4251a0 LCMapStringW
 0x4251a4 GetStringTypeW
 0x4251a8 GetLocaleInfoA
 0x4251ac CreateFileA
 0x4251b0 CloseHandle
 0x4251b4 FlushFileBuffers
 0x4251b8 GetModuleHandleA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure