(CAPA) CAPA_FileVersion_Impersonation

Download Raw

rule:
  meta:
    name: impersonate file version information
    namespace: anti-analysis/anti-forensic
    authors:
      - awillia2@cisco.com
    description: Looks for Windows API calls associated with reading and then writing file version information of executables on disk. Malware can use these calls to overwrite its own version information with that of a legitimate executable on the system (for instance, explorer.exe) to make it appear to be a legitimate application.
    scope: function
    att&ck:
      - Defense Evasion::Indicator Removal on Host [T1070]
    references:
      - https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-updateresourcea
      - https://www.carbonblack.com/blog/threat-analysis-dont-forget-about-kangaroo-ransomware/
    examples:
      - e5369ac309f1be6d77afeeb3edab0ed8:0x4025A0
  features:
    - and:
      - match: get file version info
      - api: kernel32.BeginUpdateResource
      - api: kernel32.UpdateResource
      - api: kernel32.EndUpdateResource

Associated Techniques

Technique Name Technique ID's Snippet(s) OS
Fake Signature U0506

Created

June 28, 2022

Last Revised

June 28, 2022