Scan Result:
Setup.exe
Sample Information
SHA256 | |
Sample Name | |
File Size |
4.6 MB 4866368 Bytes |
First Seen |
2024-11-25 08:16 UTC+0000 1 week, 6 days ago. |
General
MIME Type | |
MD5 Hash | |
Architecture | Intel86 32-bit (PE32) |
Compile Time |
2012-02-07 06:22 12 years, 10 months ago. |
Image Base |
0x400000
|
Entry Point |
0x1938
|
PEID Signatures
Borland_Cpp_DLL
Borland_Cpp_for_Win32_1999
Borland_Cpp_DLL_additional
File Meta Data
Company Name | |
File Description | |
File Version | |
Legal Copyright | |
Product Version |
Important Imports
- UnhookWindowsHookEx
- CallNextHookEx
- OpenProcessToken
- IsDebuggerPresent
- SuspendThread
- VirtualAlloc
- ResumeThread
- GetDesktopWindow
- GetClipboardData
- RegSetValueExW
- RegConnectRegistryW
- RegEnumKeyExW
- RegLoadKeyW
- AdjustTokenPrivileges
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- HeapAlloc
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
Matching Rules
Rule Name | Rule Type |
---|---|
YARA_QEMU_REGISTRY | YARA |
YARA_Detect_Possible_GetForegroundWindow_Evasion | YARA |
YARA_Findcrypt | YARA |
YARA_VBOX_REGISTRY | YARA |
YARA_XOR_Hunt | YARA |
YARA_Base64 | YARA |
Matching Techniques
Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
---|---|---|---|---|
Detecting Virtual Environment Artefacts | U1332 | |||
Cryptography | U0703 E1027.m04 | |||
Wiping or Encrypting | U0301 | |||
XOR Operation | U0701 E1027.m02 | |||
Base64 | U0706 E1027.m02 |