(YARA) YARA_Detect_Possible_GetForegroundWindow_Evasion
import "pe"
rule UNPROTECT_Possible_GetForegroundWindow_Evasion
{
meta:
description = "Attempts to detect possible usage of sandbox evasion techniques using GetForegroundWindow API, based on module imports."
author = "Kyle Cucci"
date = "2020-09-30"
condition:
uint16(0) == 0x5A4D and
pe.imports("user32.dll", "GetForegroundWindow") and
pe.imports("kernel32.dll", "Sleep")
}
Associated Techniques
No associated technique found so far.
Matching Samples 10 most recent
Sample Name | Matching Techniques | First Seen | Last Seen |
---|---|---|---|
FL Keys_x64.dll | 4 | 2025-02-03 | 1 day, 13 hours ago |
0b863912f72efc4e514d3165e6ae...821dfa56a1fd545dba5960f6.exe | 3 | 2025-01-11 | 3 weeks, 3 days ago |
kernel32.dll | 13 | 2024-12-30 | 1 month ago |
honeypot.exe | 5 | 2024-12-04 | 2 months ago |
br1.dll | 10 | 2024-12-03 | 2 months ago |
Niple_v6.exe | 2 | 2024-12-01 | 2 months ago |
Setup.exe | 5 | 2024-11-25 | 2 months, 1 week ago |
Microsoft Store.exe | 4 | 2024-11-23 | 2 months, 1 week ago |
8126a59c84aad134868c842eabc2...204cd859e6322d22ce5a3b937e2a | 5 | 2024-11-19 | 2 months, 2 weeks ago |
d66430568a8cc95bf12b9511c61c...3f49cab4825c60c5f4c24d33539f | 6 | 2024-11-19 | 2 months, 2 weeks ago |
Created
June 20, 2022
Last Revised
June 20, 2022