chrome-update.exe

Sanflex

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application chrome-update.exe by Sanflex has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Sanflex  (signed and verified)

MD5:
7a37ff0d099dd22a7e09e5086c813a3c

SHA-1:
6ec0ae9a86960cef89918b7e0f55abea860b6c58

SHA-256:
a12fead58ac03776edb0a9c98dd80b18022cad208f9989813a309fa7f4459545

Scanner detections:
15 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/31/2024 11:01:45 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2014.11.29

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

AVG
Generic
2015.0.3276

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/21511

Dr.Web
Adware.Downware.2220
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Secure
Adware:W32/WebInstallBundle
11.2014-28-11_6

G Data
Win32.Application.DownloadAdmin
14.11.24

IKARUS anti.virus
Trojan.Dropper
t3scan.1.8.3.0

K7 AntiVirus
Unwanted-Program
13.186.14174

Malwarebytes
PUP.Optional.DownloadAdmin
v2014.11.28.06

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.28.6.63726

Reason Heuristics
PUP.Tightrope.Bundler
15.5.3.0

VIPRE Antivirus
Threat.4783369
35224

File size:
822.6 KB (842,304 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\chrome-update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/21/2014 5:00:00 PM

Valid to:
7/21/2017 4:59:59 PM

Subject:
CN=Sanflex, O=Sanflex, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
42D7699269B5BB95341F5DA022F6E57D

File PE Metadata
Compilation timestamp:
7/15/2014 9:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:4xpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8S0:cp9sVuaVdvgVbmgGDijyikg50

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Entropy:
7.4902

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file chrome-update.exe has been seen being distributed by the following URL.

Remove chrome-update.exe - Powered by Reason Core Security