Scan Result:
procexp.exe
Sample Information
File Hash | |
Sample Name | |
File Size | 4.3 MB |
First Seen | 2024-11-21, 6 hours, 6 minutes ago. |
General
mime | application/vnd.microsoft.portable-executable |
PEID Signatures
VC8_Microsoft_Corporation
Microsoft_Visual_Cpp_8
File Meta Data
Company Name | |
File Description | |
File Version | |
Internal Name | |
Legal Copyright | |
Original Filename | |
Product Name | |
Product Version |
Important Imports
- VirtualAlloc
- CreateProcessW
- OpenThread
- ResumeThread
- OpenProcess
- CreateToolhelp32Snapshot
- Thread32First
- Thread32Next
- UnhookWindowsHookEx
- CallNextHookEx
- GetDesktopWindow
- RegSetValueExW
- RegConnectRegistryW
- RegEnumKeyExW
- RegLoadKeyW
- AdjustTokenPrivileges
- OpenProcessToken
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- ReadProcessMemory
- IsDebuggerPresent
- HeapAlloc
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
- NtQueryInformationProcess
Matching Rules
Rule Name | Rule Type |
---|---|
YARA_QEMU_REGISTRY | YARA |
YARA_disable_process | YARA |
YARA_Findcrypt | YARA |
YARA_VBOX_REGISTRY | YARA |
YARA_DetectParentProcess | YARA |
YARA_XOR_Hunt | YARA |
Matching Techniques
Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
---|---|---|---|---|
Detecting Virtual Environment Artefacts | U1332 | |||
Kill Process | U0403 | |||
Cryptography | U0703 E1027.m04 | |||
Wiping or Encrypting | U0301 | |||
Parent Process Detection | U0404 | |||
XOR Operation | U0701 E1027.m02 |