Report - chromedriver.exe

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.04.21 13:33 Machine s1_win7_x6401
Filename chromedriver.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
2.0
ZERO API file : malware
VT API (file) 58 detected (AIDetectMalware, Lumma, Malicious, score, Trojanpws, RAHack, GenericKDZ, Unsafe, Save, confidence, 100%, GenusT, EVUP, Attribute, HighConfidence, high confidence, Kryptik, MalwareX, TrojanPSW, Kryptik@AI, RDML, tiiEASxKYVRtCYRGPxlGMQ, pkdne, LUMMASTEALER, YXFDSZ, Krypt, Static AI, Suspicious PE, eyjt, Detected, GrayWare, Wacapew, LummaC, ABApplication, IRIV, R700921, Artemis, GdSda, Gencirc, PQ49L, po7hM, susgen, GenKryptik, HIHK, GSO2XJC)
md5 66d9a0d44c51c98a087c4435d5390475
sha256 e8d9018e03146038089e455a14ee2bb0fc67bccb9b1b13eaf000060ecc384445
ssdeep 12288:BOMhuQU6LugAiAe4lo8ZlWgJIC+CfkMv5iavBCA4t1anWhwLjkOQNi1xXThVOioF:U5jJoCftZjswLjiOVTfHjswLjiOVTf8
imphash 27edcdc26ece14730711ef2521583ca2
impfuzzy 24:hWnxWDoQlQtyOovbOGMUD1ulvgkWDpZWylnjBLPxQXRKT07GyiJUJYjz:hWxQo3l3612MZxJjBbxQrGyJJC
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140092758 AcquireSRWLockExclusive
 0x140092760 CloseHandle
 0x140092768 CreateFileA
 0x140092770 CreateFileW
 0x140092778 CreateThread
 0x140092780 DecodePointer
 0x140092788 DeleteCriticalSection
 0x140092790 EncodePointer
 0x140092798 EnterCriticalSection
 0x1400927a0 EnumSystemLocalesW
 0x1400927a8 ExitProcess
 0x1400927b0 ExitThread
 0x1400927b8 FindClose
 0x1400927c0 FindFirstFileExW
 0x1400927c8 FindNextFileW
 0x1400927d0 FlsAlloc
 0x1400927d8 FlsFree
 0x1400927e0 FlsGetValue
 0x1400927e8 FlsSetValue
 0x1400927f0 FlushFileBuffers
 0x1400927f8 FreeEnvironmentStringsW
 0x140092800 FreeLibrary
 0x140092808 FreeLibraryAndExitThread
 0x140092810 GetACP
 0x140092818 GetCPInfo
 0x140092820 GetCommandLineA
 0x140092828 GetCommandLineW
 0x140092830 GetConsoleMode
 0x140092838 GetConsoleOutputCP
 0x140092840 GetCurrentProcess
 0x140092848 GetCurrentProcessId
 0x140092850 GetCurrentThreadId
 0x140092858 GetEnvironmentStringsW
 0x140092860 GetExitCodeThread
 0x140092868 GetFileSize
 0x140092870 GetFileSizeEx
 0x140092878 GetFileType
 0x140092880 GetLastError
 0x140092888 GetLocaleInfoW
 0x140092890 GetModuleFileNameW
 0x140092898 GetModuleHandleA
 0x1400928a0 GetModuleHandleExW
 0x1400928a8 GetModuleHandleW
 0x1400928b0 GetOEMCP
 0x1400928b8 GetProcAddress
 0x1400928c0 GetProcessHeap
 0x1400928c8 GetStartupInfoW
 0x1400928d0 GetStdHandle
 0x1400928d8 GetStringTypeW
 0x1400928e0 GetSystemTimeAsFileTime
 0x1400928e8 GetUserDefaultLCID
 0x1400928f0 HeapAlloc
 0x1400928f8 HeapFree
 0x140092900 HeapReAlloc
 0x140092908 HeapSize
 0x140092910 InitializeCriticalSectionAndSpinCount
 0x140092918 InitializeCriticalSectionEx
 0x140092920 InitializeSListHead
 0x140092928 IsDebuggerPresent
 0x140092930 IsProcessorFeaturePresent
 0x140092938 IsValidCodePage
 0x140092940 IsValidLocale
 0x140092948 LCMapStringEx
 0x140092950 LCMapStringW
 0x140092958 LeaveCriticalSection
 0x140092960 LoadLibraryExW
 0x140092968 MultiByteToWideChar
 0x140092970 QueryPerformanceCounter
 0x140092978 QueryPerformanceFrequency
 0x140092980 RaiseException
 0x140092988 ReadConsoleW
 0x140092990 ReadFile
 0x140092998 ReleaseSRWLockExclusive
 0x1400929a0 RtlCaptureContext
 0x1400929a8 RtlLookupFunctionEntry
 0x1400929b0 RtlPcToFileHeader
 0x1400929b8 RtlUnwind
 0x1400929c0 RtlUnwindEx
 0x1400929c8 RtlVirtualUnwind
 0x1400929d0 SetFilePointerEx
 0x1400929d8 SetLastError
 0x1400929e0 SetStdHandle
 0x1400929e8 SetUnhandledExceptionFilter
 0x1400929f0 Sleep
 0x1400929f8 SleepConditionVariableSRW
 0x140092a00 TerminateProcess
 0x140092a08 TlsAlloc
 0x140092a10 TlsFree
 0x140092a18 TlsGetValue
 0x140092a20 TlsSetValue
 0x140092a28 TryAcquireSRWLockExclusive
 0x140092a30 UnhandledExceptionFilter
 0x140092a38 WaitForSingleObjectEx
 0x140092a40 WakeAllConditionVariable
 0x140092a48 WideCharToMultiByte
 0x140092a50 WriteConsoleW
 0x140092a58 WriteFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure