(YARA) YARA_Detect_Possible_GetForegroundWindow_Evasion

Download Raw

import "pe"
 
rule UNPROTECT_Possible_GetForegroundWindow_Evasion
{
    meta:
        description = "Attempts to detect possible usage of sandbox evasion techniques using GetForegroundWindow API, based on module imports."
        author = "Kyle Cucci"
        date = "2020-09-30"
 
    condition:
        uint16(0) == 0x5A4D and
        pe.imports("user32.dll", "GetForegroundWindow") and
        pe.imports("kernel32.dll", "Sleep")
}

Associated Techniques

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
FL Keys_x64.dll 4 2025-02-03 1 day, 13 hours ago
0b863912f72efc4e514d3165e6ae...821dfa56a1fd545dba5960f6.exe 3 2025-01-11 3 weeks, 3 days ago
kernel32.dll 13 2024-12-30 1 month ago
honeypot.exe 5 2024-12-04 2 months ago
br1.dll 10 2024-12-03 2 months ago
Niple_v6.exe 2 2024-12-01 2 months ago
Setup.exe 5 2024-11-25 2 months, 1 week ago
Microsoft Store.exe 4 2024-11-23 2 months, 1 week ago
8126a59c84aad134868c842eabc2...204cd859e6322d22ce5a3b937e2a 5 2024-11-19 2 months, 2 weeks ago
d66430568a8cc95bf12b9511c61c...3f49cab4825c60c5f4c24d33539f 6 2024-11-19 2 months, 2 weeks ago
View All

Created

June 20, 2022

Last Revised

June 20, 2022