Report - chrome_130.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.11.11 10:22 Machine s1_win7_x6403
Filename chrome_130.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.4
ZERO API
VT API (file) 56 detected (AIDetectMalware, Stealc, Malicious, score, Convagent, Lockbit, GenericKD, Unsafe, confidence, 100%, Genus, Attribute, HighConfidence, high confidence, Kryptik, HYFO, DropperX, Stealerc, TrojanPSW, ktfriu, Kryptik@AI, RDML, 9OAHYAWjkiofKWMav1ktMQ, iznqe, DownLoader47, Real Protect, high, Krypt, Detected, Malware@#2f00oos1n3kzf, Wacatac, MREZZ9, Eldorado, R658943, Artemis, MalwareVision, Chgt, Tofsee, susgen, PossibleThreat)
md5 b6b5c883190b5b3673f37458954688a3
sha256 90bf1aea7c89baeed430c90a5d29709fa13391996d6258a3ef7c710431f3e663
ssdeep 12288:zDrNfRsHZR2fE2QyoS2/dvyohRS4NlOeNlrLJFgVoitcPC:z/wXDyZ21vLK4Nlt/ZFCcP
imphash a20218377378835f816db93bd4ba0e01
impfuzzy 24:hkkPyYhBbG2SefMdNW3kCI9bDREdQBSrdgDqn+bEnxNOovttL0J3QcfdYvoFBRym:hRs1T0pdRUqVektYQcfy90SBJsH
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x487000 DebugActiveProcess
 0x487004 SetVolumeLabelA
 0x487008 GetNumaProcessorNode
 0x48700c MoveFileExA
 0x487010 GetConsoleAliasExesLengthA
 0x487014 CallNamedPipeA
 0x487018 InterlockedDecrement
 0x48701c GetLogicalDriveStringsW
 0x487020 GlobalSize
 0x487024 SetDefaultCommConfigW
 0x487028 GlobalLock
 0x48702c GetModuleHandleW
 0x487030 GetTickCount
 0x487034 GlobalAlloc
 0x487038 GetConsoleMode
 0x48703c GetLocaleInfoW
 0x487040 GetSystemWow64DirectoryW
 0x487044 GetProcessHandleCount
 0x487048 HeapCreate
 0x48704c GetTimeFormatW
 0x487050 GetConsoleAliasW
 0x487054 SetConsoleCursorPosition
 0x487058 GetFileAttributesW
 0x48705c GetModuleFileNameW
 0x487060 GetACP
 0x487064 GetStartupInfoW
 0x487068 GetStringTypeExA
 0x48706c GetStdHandle
 0x487070 ReadConsoleOutputCharacterA
 0x487074 GetProcAddress
 0x487078 MoveFileW
 0x48707c VirtualAllocEx
 0x487080 LoadLibraryA
 0x487084 InterlockedExchangeAdd
 0x487088 OpenWaitableTimerW
 0x48708c SetCommMask
 0x487090 FindAtomA
 0x487094 SetNamedPipeHandleState
 0x487098 OpenFileMappingW
 0x48709c FreeEnvironmentStringsW
 0x4870a0 BuildCommDCBA
 0x4870a4 PurgeComm
 0x4870a8 GetVersionExA
 0x4870ac LocalFileTimeToFileTime
 0x4870b0 CloseHandle
 0x4870b4 WriteConsoleW
 0x4870b8 GetConsoleOutputCP
 0x4870bc WriteConsoleA
 0x4870c0 MultiByteToWideChar
 0x4870c4 HeapAlloc
 0x4870c8 GetLastError
 0x4870cc HeapReAlloc
 0x4870d0 GetCommandLineA
 0x4870d4 GetStartupInfoA
 0x4870d8 TerminateProcess
 0x4870dc GetCurrentProcess
 0x4870e0 UnhandledExceptionFilter
 0x4870e4 SetUnhandledExceptionFilter
 0x4870e8 IsDebuggerPresent
 0x4870ec GetCPInfo
 0x4870f0 InterlockedIncrement
 0x4870f4 GetOEMCP
 0x4870f8 IsValidCodePage
 0x4870fc TlsGetValue
 0x487100 TlsAlloc
 0x487104 TlsSetValue
 0x487108 TlsFree
 0x48710c SetLastError
 0x487110 GetCurrentThreadId
 0x487114 DeleteCriticalSection
 0x487118 LeaveCriticalSection
 0x48711c EnterCriticalSection
 0x487120 HeapFree
 0x487124 VirtualFree
 0x487128 VirtualAlloc
 0x48712c Sleep
 0x487130 ExitProcess
 0x487134 WriteFile
 0x487138 GetModuleFileNameA
 0x48713c HeapSize
 0x487140 FreeEnvironmentStringsA
 0x487144 GetEnvironmentStrings
 0x487148 WideCharToMultiByte
 0x48714c GetEnvironmentStringsW
 0x487150 SetHandleCount
 0x487154 GetFileType
 0x487158 QueryPerformanceCounter
 0x48715c GetCurrentProcessId
 0x487160 GetSystemTimeAsFileTime
 0x487164 LCMapStringA
 0x487168 LCMapStringW
 0x48716c GetStringTypeA
 0x487170 GetStringTypeW
 0x487174 GetLocaleInfoA
 0x487178 InitializeCriticalSectionAndSpinCount
 0x48717c RtlUnwind
 0x487180 SetFilePointer
 0x487184 GetConsoleCP
 0x487188 FlushFileBuffers
 0x48718c SetStdHandle
 0x487190 CreateFileA
ole32.dll
 0x487198 CoTaskMemAlloc

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure