Scan Result:
malw_test.exe
Sample Information
| SHA256 | |
| Sample Name | |
| File Size |
1.5 MB 1600513 Bytes |
| First Seen |
2024-11-14 02:12 UTC+0000 11 months, 2 weeks ago. |
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86 (PE32) |
| Compile Time |
2024-11-10 11:37 11 months, 3 weeks ago. |
| Image Base |
0x400000
|
| Entry Point |
0x204f7
|
PEID Signatures
VC8_Microsoft_CorporationMicrosoft_Visual_Cpp_8
Important Imports
- VirtualAllocEx
- WriteProcessMemory
- OpenProcessToken
- IsDebuggerPresent
- VirtualAlloc
- CreateProcessW
- ResumeThread
- OpenProcess
- CreateToolhelp32Snapshot
- GetDesktopWindow
- GetClipboardData
- RegSetValueExW
- RegConnectRegistryW
- RegEnumKeyExW
- AdjustTokenPrivileges
- RegOpenKeyExW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- ReadProcessMemory
- HeapAlloc
- UnhandledExceptionFilter
- GetProcAddress
- InternetOpenW
- InternetConnectW
- FtpOpenFileW
- InternetReadFile
Matching Rules
| Rule Name | Rule Type |
|---|---|
| YARA_Detect_Possible_GetForegroundWindow_Evasion | YARA |
| YARA_disable_process | YARA |
| YARA_Findcrypt | YARA |
| YARA_DetectParentProcess | YARA |
| YARA_XOR_Hunt | YARA |
Matching Techniques
| Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
|---|---|---|---|---|
| Kill Process | U0403 | |||
| Cryptography | U0703 E1027.m04 | |||
| Wiping or Encrypting | U0301 | |||
| Parent Process Detection | U0404 | |||
| XOR Operation | U0701 E1027.m02 |