Edit tour

Windows Analysis Report
GoogleChrome.exe

Overview

General Information

Sample name:GoogleChrome.exe
Analysis ID:1578099
MD5:bdb004be4766cdc96a01f56c66ef9637
SHA1:8b888649c2dd47b7d4d0f350d9e7a62009a0e771
SHA256:b7dcf9f42b2220e1cf0705813c6aaa4d3acd222d4936a93cc31021b89fae89da
Tags:de-pumpedexeuser-abuse_ch

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to prevent local Windows debugging
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • GoogleChrome.exe (PID: 2888 cmdline: "C:\Users\user\Desktop\GoogleChrome.exe" MD5: BDB004BE4766CDC96A01F56C66EF9637)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: GoogleChrome.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: GoogleChrome.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x86.Release\dlls\mscordac\mscordaccore.pdb source: GoogleChrome.exe
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x86.Release\Corehost.Static\singlefilehost.pdb source: GoogleChrome.exe
Source: GoogleChrome.exeString found in binary or memory: http://.css
Source: GoogleChrome.exeString found in binary or memory: http://.jpg
Source: GoogleChrome.exeString found in binary or memory: http://html4/loose.dtd
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet-core-applaunch?Description:
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/download
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/downloadInstall
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/info
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/sdk-not-foundFailed
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C6A0C0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DCB080
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D61050
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BB1010
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D6A030
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DA11F0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B40130
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B74110
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DD4110
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F4F100
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B65140
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BDB280
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DD62E0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F4A270
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BB0260
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C31230
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DA6220
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C7A3E0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00AEC4A0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F5C490
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DA1540
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B99560
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00EF86E0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C696E0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00DD38D0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BA4890
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BA89E0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C68940
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B81920
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D65970
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C8EAD0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B2FBA0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B86BA0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BA7B10
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D2EB00
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00EF8CB0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00BE8C40
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00EFEF90
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F94F70
Source: GoogleChrome.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Source: GoogleChrome.exeBinary or memory string: OriginalFilename vs GoogleChrome.exe
Source: GoogleChrome.exe, 00000000.00000002.2128519823.0000000005244000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenamemscordaccore.dll@ vs GoogleChrome.exe
Source: GoogleChrome.exe, 00000000.00000002.2128519823.0000000005244000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameWpf.dll( vs GoogleChrome.exe
Source: GoogleChrome.exe, 00000000.00000000.2126759728.0000000001135000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemscordaccore.dll@ vs GoogleChrome.exe
Source: GoogleChrome.exe, 00000000.00000000.2126759728.0000000001135000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWpf.dll( vs GoogleChrome.exe
Source: GoogleChrome.exeBinary or memory string: OriginalFilenamemscordaccore.dll@ vs GoogleChrome.exe
Source: GoogleChrome.exeBinary or memory string: OriginalFilenameWpf.dll( vs GoogleChrome.exe
Source: GoogleChrome.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus25.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D28410 FormatMessageW,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,wcscpy_s,HeapFree,HeapFree,
Source: GoogleChrome.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.62%
Source: C:\Users\user\Desktop\GoogleChrome.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: GoogleChrome.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: GoogleChrome.exeString found in binary or memory: Morph - Structs/AddrExp
Source: GoogleChrome.exeString found in binary or memory: prejitNYI: patchpoint info generationlooptail.call and not BBINSTRImportationPre-importExpand patchpointsIndirect call transformProfile instrumentation prepPost-importProfile incorporationProfile instrumentationMorph - InliningMorph - InitAllocate ObjectsMorph - Add internal blocksRemove empty finallyRemove empty tryClone finallyMerge callfinally chainsCompute predsUpdate finally target flagsMorph - Structs/AddrExpUpdate flow graph early passMorph - ByRefsForward SubstitutionMorph - GlobalMorph - Promote StructsGS CookieMorph - FinishMerge throw blocksCompute edge weights (1, false)Optimize control flowInvert loopsCompute blocks reachabilityOptimize layoutRedundant zero InitsSet block weightsClone loopsFind loopsClear loop infoUnroll loopsHoist loop codeMorph array opsOpt add copiesMark local varsFind oper orderOptimize boolsBuild SSA representationSet block orderSSA: Doms1SSA: topological sortSSA: DFSSA: livenessSSA: renameSSA: insert phisDo value numberingEarly Value PropagationOptimize Valnum CSEsOptimize index checksRedundant branch optsVN based copy propUpdate flow graph opt passAssertion propInsert GC PollsCompute edge weights (2, false)Rationalize IRDetermine first cold blockLocal var livenessDo 'simple' loweringPer block local var livenessLocal var liveness initLowering decompositionGlobal local var livenessCalculate stack level slotsLowering nodeinfoLSRA build intervalsLinear scan register allocLSRA resolveLSRA allocateGenerate codePlace 'align' instructionsEmit GC+EH tablesEmit codePost-EmitProcessor does not have a high-frequency timer.
Source: GoogleChrome.exeString found in binary or memory: kernelbase.dllVirtualAlloc2MapViewOfFile3bad array new lengthstring too longApplication root path is empty. This shouldn't happenUsing internal fxrUsing internal hostpolicyPath containing probing policy and assemblies to probe for.--depsfile--additionalprobingpath<path>Path to <application>.runtimeconfig.json file.--fx-versionPath to <application>.deps.json file.--runtimeconfig--roll-forward<value><version>Version of the installed Shared Framework to use to run the application.Path to additional deps.json file.--roll-forward-on-no-candidate-fxRoll forward to framework version (LatestPatch, Minor, LatestMinor, Major, LatestMajor, Disable)--additional-depssdkParsed known arg %s = %s<n><obsolete>Using the provided arguments to determine the application to execute.Application '%s' is not a managed executable.Failed to parse supported options or their values: %s %-*s %sThe application to execute does not exist: '%s'--- Executing in split/FX mode...Application '%s' does not exist.dotnet exec needs a managed .dll or .exe extension. The application specified was '%s'execstatic--- Executing in a native executable mode...--- Executing in muxer mode... No SDKs were found.
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/download --list-runtimes Display the installed runtimes --list-sdks Display the installed SDKs The path to an application .dll file to execute.host-options: --info Display .NET information.vector too longCommon Options: -h|--help Displays this help.invalid hash bucket countinvalid string positionunordered_map/set too long--- Invoked %s [commit hash: %s]hostfxr_main_bundle_startupinfohostfxr_main_startupinfoA fatal error occurred while processing application bundleInvalid startup info: host_path, dotnet_root, and app_path should not be null.get-native-search-directories.json.dev.jsonHosting components are already initialized. Re-initialization to execute an app is not allowed.|arch|/|tfm|Ignoring host interpreted additional probing path %s as it does not exist.Runtime config is cfg=%s dev=%s|arch|\|tfm|App runtimeconfig.json from [%s]Specified runtimeconfig.json from [%s]Ignoring additional probing path %s as it does not exist.The specified runtimeconfig.json [%s] does not existDetecting mode... CoreCLR present in dotnet root [%s] and checking if [%s] file present=[%d].runtimeconfig.jsonInvalid runtimeconfig.json [%s] [%s].deps.jsonIt's invalid to use both '%s' and '%s' command line options.DOTNET_ADDITIONAL_DEPSThe specified deps.json [%s] does not existInvalid value for command line argument '%s'self-containedExecuting as a %s app as per config file [%s]HOSTFXR_PATHframework-dependent--list-sdks--list-runtimesUsing dotnet root path [%s]-?/?-h--help dotnet.dll--infoThe command could not be loaded, possibly because:
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/download --list-runtimes Display the installed runtimes --list-sdks Display the installed SDKs The path to an application .dll file to execute.host-options: --info Display .NET information.vector too longCommon Options: -h|--help Displays this help.invalid hash bucket countinvalid string positionunordered_map/set too long--- Invoked %s [commit hash: %s]hostfxr_main_bundle_startupinfohostfxr_main_startupinfoA fatal error occurred while processing application bundleInvalid startup info: host_path, dotnet_root, and app_path should not be null.get-native-search-directories.json.dev.jsonHosting components are already initialized. Re-initialization to execute an app is not allowed.|arch|/|tfm|Ignoring host interpreted additional probing path %s as it does not exist.Runtime config is cfg=%s dev=%s|arch|\|tfm|App runtimeconfig.json from [%s]Specified runtimeconfig.json from [%s]Ignoring additional probing path %s as it does not exist.The specified runtimeconfig.json [%s] does not existDetecting mode... CoreCLR present in dotnet root [%s] and checking if [%s] file present=[%d].runtimeconfig.jsonInvalid runtimeconfig.json [%s] [%s].deps.jsonIt's invalid to use both '%s' and '%s' command line options.DOTNET_ADDITIONAL_DEPSThe specified deps.json [%s] does not existInvalid value for command line argument '%s'self-containedExecuting as a %s app as per config file [%s]HOSTFXR_PATHframework-dependent--list-sdks--list-runtimesUsing dotnet root path [%s]-?/?-h--help dotnet.dll--infoThe command could not be loaded, possibly because:
Source: GoogleChrome.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
Source: C:\Users\user\Desktop\GoogleChrome.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\GoogleChrome.exeSection loaded: kernel.appcore.dll
Source: GoogleChrome.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: GoogleChrome.exeStatic file information: File size 8266752 > 1048576
Source: GoogleChrome.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x520400
Source: GoogleChrome.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x138a00
Source: GoogleChrome.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x132e00
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: GoogleChrome.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: GoogleChrome.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x86.Release\dlls\mscordac\mscordaccore.pdb source: GoogleChrome.exe
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x86.Release\Corehost.Static\singlefilehost.pdb source: GoogleChrome.exe
Source: GoogleChrome.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: GoogleChrome.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: GoogleChrome.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: GoogleChrome.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: GoogleChrome.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00EFFE80 LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,GetCurrentProcess,VirtualFree,VirtualFree,GetCurrentProcess,VirtualFree,GetCurrentProcess,VirtualProtect,
Source: GoogleChrome.exeStatic PE information: section name: .CLR_UEF
Source: GoogleChrome.exeStatic PE information: section name: .didat
Source: GoogleChrome.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D35DD0 rdtsc
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D34190 GetSystemInfo,GetSystemInfo,GetSystemInfo,GetSystemInfo,GetSystemInfo,GetSystemInfo,VirtualAlloc,VirtualQuery,VirtualAlloc,
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D35DD0 rdtsc
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00C900D0 IsDebuggerPresent,
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00EFFE80 LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,GetCurrentProcess,VirtualFree,VirtualFree,GetCurrentProcess,VirtualFree,GetCurrentProcess,VirtualProtect,
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00D640D0 GetProcessHeap,HeapAlloc,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F8E559 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00B106A0 IsDebuggerPresent,RaiseFailFastException,IsDebuggerPresent,SetErrorMode,SetErrorMode,IsDebuggerPresent,SetErrorMode,SetErrorMode,IsDebuggerPresent,DebugBreak,SetErrorMode,SetErrorMode,
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F8D04A cpuid
Source: C:\Users\user\Desktop\GoogleChrome.exeCode function: 0_2_00F8F13E GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1578099 Sample: GoogleChrome.exe Startdate: 19/12/2024 Architecture: WINDOWS Score: 25 4 GoogleChrome.exe 2->4         started        signatures3 7 Contains functionality to prevent local Windows debugging 4->7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GoogleChrome.exe1%VirustotalBrowse
GoogleChrome.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://html4/loose.dtdGoogleChrome.exefalse
    high
    https://aka.ms/dotnet/app-launch-failedGoogleChrome.exefalse
      high
      http://.cssGoogleChrome.exefalse
        high
        https://aka.ms/dotnet/downloadInstallGoogleChrome.exefalse
          high
          https://aka.ms/dotnet/infoGoogleChrome.exefalse
            high
            https://aka.ms/dotnet-core-applaunch?Description:GoogleChrome.exefalse
              high
              http://.jpgGoogleChrome.exefalse
                high
                https://aka.ms/dotnet/sdk-not-foundFailedGoogleChrome.exefalse
                  high
                  https://aka.ms/dotnet-core-applaunch?GoogleChrome.exefalse
                    high
                    https://aka.ms/dotnet/downloadGoogleChrome.exefalse
                      high
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1578099
                      Start date and time:2024-12-19 08:59:16 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 45s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:2
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:GoogleChrome.exe
                      Detection:SUS
                      Classification:sus25.evad.winEXE@1/0@0/0
                      EGA Information:Failed
                      HCA Information:Failed
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.63
                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net
                      • Execution Graph export aborted for target GoogleChrome.exe, PID 2888 because there are no executed function
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.493401151531059
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.62%
                      • Win32 Executable (generic) a (10002005/4) 49.57%
                      • Windows ActiveX control (116523/4) 0.58%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.21%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:GoogleChrome.exe
                      File size:8'266'752 bytes
                      MD5:bdb004be4766cdc96a01f56c66ef9637
                      SHA1:8b888649c2dd47b7d4d0f350d9e7a62009a0e771
                      SHA256:b7dcf9f42b2220e1cf0705813c6aaa4d3acd222d4936a93cc31021b89fae89da
                      SHA512:24a23ee3cd4979c68c7c88a7014f8802be0b7ae2f25f4aa9923aec5645607fbdf8ac826e971fb7ce81faa1f29726fb7475712a9c6fdd36892a328d7e0e0c5c5a
                      SSDEEP:196608:a1cuQvBwZdmuqpVmq3Mq1eCG3HqUAPVjM+WCcGns3RA:aWwZdSbmqaBAxM3Cp
                      TLSH:8B869E30B606C537DD8A05B0897DAB9FA1AD7B34076550C7B2D86E2D29B11C3373AE93
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........EuJ.$...$...$...\...$..U....$..U....$..U....$...\...$...\...$...$..a%..d....$..d....&..d....$..d....$..d....$..Rich.$.........
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x8ced30
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6647965C [Fri May 17 17:39:40 2024 UTC]
                      TLS Callbacks:0x8ce340, 0x8ce9e0
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:aba8a24011fe6f23c973864173d08899
                      Instruction
                      call 00007F593CF781DBh
                      jmp 00007F593CF77BEDh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push 008CFC10h
                      push dword ptr fs:[00000000h]
                      mov eax, dword ptr [esp+10h]
                      mov dword ptr [esp+10h], ebp
                      lea ebp, dword ptr [esp+10h]
                      sub esp, eax
                      push ebx
                      push esi
                      push edi
                      mov eax, dword ptr [00A5C040h]
                      xor dword ptr [ebp-04h], eax
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-18h], esp
                      push dword ptr [ebp-08h]
                      mov eax, dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFEh
                      mov dword ptr [ebp-08h], eax
                      lea eax, dword ptr [ebp-10h]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push ebp
                      mov ebp, esp
                      and dword ptr [00A615F0h], 00000000h
                      sub esp, 24h
                      or dword ptr [00A5C090h], 01h
                      push 0000000Ah
                      call dword ptr [00923338h]
                      test eax, eax
                      je 00007F593CF77F32h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-20h]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 756E6547h
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-04h], eax
                      mov eax, dword ptr [ebp-1Ch]
                      xor eax, 6C65746Eh
                      mov dword ptr [ebp-08h], eax
                      xor eax, eax
                      inc eax
                      push ebx
                      cpuid
                      mov esi, ebx
                      Programming Language:
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x6590c00xc4.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x6591840x168.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6810000x132c20.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b40000x3fbf4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x5f1f300x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x5f1fc00x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5288e00x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x5230000x724.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x658eb80x60.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5202ba0x5204000271f1090d04373bb8f733f5ae3c06f0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .CLR_UEF0x5220000x440x20025e22a4b22bbd7937052841654b70e51False0.134765625data0.9617583915731932IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x5230000x13886a0x138a00d555dc0d2f90e498565c180f4d0f741dFalse0.36802076044582166data5.0787461397855616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x65c0000x12d440x54007b45ea44ad5d8d25a908ca52d5f949d5False0.2582310267857143Matlab v4 mat-file (little endian) \377\377\377\377, numeric, rows 0, columns 03.661361389453818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didat0x66f0000x1c0x200e3df865f7b3317ce27fdb3c83d08017eFalse0.0546875data0.25996289920834015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      _RDATA0x6700000x10f100x11000211089d7d672e1712b48c26d0bdc0a1bFalse0.16291360294117646data5.364619170209927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x6810000x132c200x132e00c973db436815f5ba1b825bffed80e79fFalse0.4053342986252546data6.374088925847873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x7b40000x3fbf40x3fc004674daa7f29d78e04032dd8467961550False0.5970435049019608data6.676844709798884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_RCDATA0x68113c0x24data1.1666666666666667
                      RT_RCDATA0x6811600x132610PE32 executable (DLL) (GUI) Intel 80386, for MS Windows0.412567138671875
                      RT_VERSION0x7b37700x284data0.4472049689440994
                      RT_MANIFEST0x7b39f40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                      DLLImport
                      KERNEL32.dllRaiseException, FreeLibrary, RaiseFailFastException, GetExitCodeProcess, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, AddVectoredExceptionHandler, MultiByteToWideChar, GetTickCount, GetCurrentProcessId, FlushInstructionCache, QueryPerformanceFrequency, QueryPerformanceCounter, InterlockedPushEntrySList, InterlockedFlushSList, InitializeSListHead, GetTickCount64, DuplicateHandle, QueueUserAPC, WaitForSingleObjectEx, SetThreadPriority, GetThreadPriority, ResumeThread, GetCurrentThreadId, TlsAlloc, GetCurrentThread, CreateThread, GetModuleHandleW, WaitForMultipleObjectsEx, SignalObjectAndWait, SetThreadStackGuarantee, VirtualQuery, WriteFile, GetStdHandle, GetConsoleOutputCP, MapViewOfFileEx, UnmapViewOfFile, GetStringTypeExW, SetEvent, GetCurrentProcessorNumber, GlobalMemoryStatusEx, CreateIoCompletionPort, PostQueuedCompletionStatus, GetQueuedCompletionStatus, InterlockedPopEntrySList, GetCurrentProcessorNumberEx, ExitProcess, Sleep, CreateMemoryResourceNotification, GetProcessAffinityMask, SetThreadIdealProcessorEx, GetThreadIdealProcessorEx, GetLargePageMinimum, VirtualUnlock, ResetWriteWatch, GetWriteWatch, GetLogicalProcessorInformation, SetThreadGroupAffinity, SetThreadAffinityMask, IsProcessInJob, QueryInformationJobObject, K32GetProcessMemoryInfo, VirtualAlloc, VirtualFree, VirtualProtect, SleepEx, SwitchToThread, CloseThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolTimer, ReadFile, GetFileSize, GetEnvironmentVariableW, SetEnvironmentVariableW, CreateEventW, ResetEvent, CreateSemaphoreExW, ReleaseSemaphore, CreateMutexW, ReleaseMutex, GetThreadContext, WaitForSingleObject, SetThreadContext, GetEnabledXStateFeatures, InitializeContext, CopyContext, SetXStateFeaturesMask, WerRegisterRuntimeExceptionModule, GetSystemDefaultLCID, GetUserDefaultLCID, OutputDebugStringA, RtlUnwind, HeapAlloc, HeapFree, GetProcessHeap, HeapCreate, HeapDestroy, GetEnvironmentStringsW, FreeEnvironmentStringsW, FormatMessageW, GetACP, LCMapStringEx, LocalFree, VerSetConditionMask, VerifyVersionInfoW, IsWow64Process, QueryThreadCycleTime, VirtualAllocExNuma, GetNumaProcessorNodeEx, GetNumaHighestNodeNumber, GetSystemTimes, GetSystemTimeAsFileTime, GetModuleFileNameW, CreateProcessW, GetCPInfo, LoadLibraryExW, CreateFileW, GetFileAttributesExW, GetTempPathW, GetCurrentDirectoryW, GetFullPathNameW, LoadLibraryExA, OpenEventW, ExitThread, HeapReAlloc, CreateNamedPipeA, WaitForMultipleObjects, DisconnectNamedPipe, CreateFileA, CancelIoEx, GetOverlappedResult, ConnectNamedPipe, FlushFileBuffers, SetFilePointer, CreateFileMappingW, MapViewOfFile, GetActiveProcessorGroupCount, GetSystemTime, SetConsoleCtrlHandler, GetLocaleInfoEx, GetUserDefaultLocaleName, LoadLibraryW, CreateDirectoryW, RemoveDirectoryW, GetFileSizeEx, FindFirstFileExW, FindNextFileW, FindClose, LoadLibraryA, EncodePointer, GetEnvironmentVariableA, DecodePointer, ReleaseSRWLockExclusive, CloseHandle, TlsSetValue, TlsGetValue, GetSystemInfo, GetCurrentProcess, ReadProcessMemory, OutputDebugStringW, IsDebuggerPresent, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, GetCommandLineW, GetProcAddress, GetModuleHandleExW, SetErrorMode, FlushProcessWriteBuffers, SetLastError, DebugBreak, GetLastError, SuspendThread, WideCharToMultiByte, InitializeCriticalSectionEx, GetStringTypeW, GetExitCodeThread, TryAcquireSRWLockExclusive, TlsFree, InitializeCriticalSectionAndSpinCount, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, IsProcessorFeaturePresent, CreateFileMappingA
                      ADVAPI32.dllRegGetValueW, SetKernelObjectSecurity, GetSidSubAuthorityCount, GetSidSubAuthority, GetTokenInformation, DeregisterEventSource, ReportEventW, RegisterEventSourceW, RegQueryValueExW, RegOpenKeyExW, RegCloseKey, EventRegister, AdjustTokenPrivileges, OpenProcessToken, LookupPrivilegeValueW, SetThreadToken, RevertToSelf, OpenThreadToken, EventWriteTransfer, EventWrite
                      ole32.dllCoWaitForMultipleHandles, CoRegisterInitializeSpy, CoInitializeEx, CoCreateGuid, CoTaskMemAlloc, CoTaskMemFree, CoReleaseMarshalData, CoUninitialize, CLSIDFromProgID, CoGetMarshalSizeMax, CoMarshalInterface, CoUnmarshalInterface, CoGetObjectContext, CoGetContextToken, CoGetClassObject, CoCreateFreeThreadedMarshaler, CreateStreamOnHGlobal, IIDFromString, CoRevokeInitializeSpy, StringFromGUID2
                      OLEAUT32.dllSafeArrayGetDim, SafeArrayGetLBound, SafeArrayDestroy, QueryPathOfRegTypeLib, LoadTypeLibEx, SafeArrayGetVartype, VariantChangeType, VariantChangeTypeEx, VariantClear, VariantInit, VarCyFromDec, SafeArrayAllocDescriptorEx, SysAllocStringLen, SafeArraySetRecordInfo, SafeArrayAllocData, SafeArrayGetElemsize, SysStringByteLen, SysAllocStringByteLen, SafeArrayCreateVector, SafeArrayPutElement, LoadRegTypeLib, CreateErrorInfo, SysStringLen, SetErrorInfo, GetErrorInfo, SysFreeString, GetRecordInfoFromTypeInfo, SysAllocString
                      USER32.dllMessageBoxW, LoadStringW
                      SHELL32.dllShellExecuteW
                      api-ms-win-crt-string-l1-1-0.dll_wcsnicmp, strlen, wcscpy_s, _strdup, wcsncpy_s, _wcsicmp, strcmp, strcat_s, strncpy_s, isspace, strtok_s, strcpy_s, _strnicmp, isalpha, strcspn, wcsncmp, isdigit, toupper, wcsnlen, _stricmp, iswspace, strncat_s, isupper, wcsncat_s, wcstok_s, _wcsdup, tolower, towlower, islower, wcscat_s, towupper, __strncnt, strnlen, strncmp, iswascii, iswupper
                      api-ms-win-crt-stdio-l1-1-0.dllfopen, _flushall, __stdio_common_vswprintf, __stdio_common_vfwprintf, fputws, fputwc, _get_stream_buffer_pointers, _fseeki64, fread, fsetpos, _set_fmode, ungetc, fgetpos, fgetc, fputc, _wfsopen, fputs, __p__commode, __stdio_common_vsnprintf_s, __stdio_common_vsscanf, __stdio_common_vsnwprintf_s, fgets, setvbuf, fflush, _setmode, __acrt_iob_func, _dup, _fileno, ftell, fseek, _wfopen, fclose, __stdio_common_vfprintf, __stdio_common_vsprintf_s, fwrite
                      api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _register_thread_local_exe_atexit_callback, _controlfp_s, _c_exit, _invalid_parameter_noinfo, _errno, _wcserror_s, __p___wargv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_wide_environment, _initialize_wide_environment, _configure_wide_argv, terminate, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, abort, exit, _initialize_onexit_table, _register_onexit_function
                      api-ms-win-crt-convert-l1-1-0.dll_ltow_s, wcstoul, strtoul, atol, _wtoi, atoi, strtoull, _itow_s, _wcstoui64
                      api-ms-win-crt-heap-l1-1-0.dllcalloc, _set_new_mode, malloc, realloc, free
                      api-ms-win-crt-utility-l1-1-0.dllqsort
                      api-ms-win-crt-math-l1-1-0.dll_CIsinh, __libm_sse2_acos, _CIfmod, _CIcosh, _CIatan2, _copysign, modf, _dclass, __libm_sse2_asin, __libm_sse2_atan, __libm_sse2_atan2, __libm_sse2_cos, __libm_sse2_exp, __libm_sse2_log, __libm_sse2_log10, __libm_sse2_pow, __libm_sse2_sin, __libm_sse2_tan, _libm_sse2_acos_precise, _libm_sse2_asin_precise, log2, atanh, acosh, cbrt, asinh, asinhf, atanhf, cbrtf, acoshf, log2f, _libm_sse2_atan_precise, _libm_sse2_cos_precise, _libm_sse2_exp_precise, _libm_sse2_log10_precise, _libm_sse2_log_precise, _isnan, _libm_sse2_pow_precise, _libm_sse2_sin_precise, _CItanh, _libm_sse2_sqrt_precise, _libm_sse2_tan_precise, _fdopen, ceil, floor, trunc, truncf, ilogb, ilogbf, _finite, fma, frexp, fmaf, _ldclass, __setusermatherr
                      api-ms-win-crt-time-l1-1-0.dll_time64, wcsftime, _gmtime64_s
                      api-ms-win-crt-environment-l1-1-0.dllgetenv
                      api-ms-win-crt-locale-l1-1-0.dll__pctype_func, ___mb_cur_max_func, setlocale, _unlock_locales, ___lc_locale_name_func, ___lc_codepage_func, localeconv, _lock_locales, _configthreadlocale
                      api-ms-win-crt-filesystem-l1-1-0.dll_wrename, _lock_file, _unlock_file, _wremove
                      NameOrdinalAddress
                      CLRJitAttachState30xa6822c
                      DotNetRuntimeInfo40xa5d610
                      MetaDataGetDispenser50x87f490
                      g_CLREngineMetrics20xa5d080
                      g_dacTable60x93ba88
                      No network behavior found
                      No statistics
                      Target ID:0
                      Start time:03:00:15
                      Start date:19/12/2024
                      Path:C:\Users\user\Desktop\GoogleChrome.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\GoogleChrome.exe"
                      Imagebase:0xac0000
                      File size:8'266'752 bytes
                      MD5 hash:BDB004BE4766CDC96A01F56C66EF9637
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      No disassembly