Scan Result:
TMeter.exe
Sample Information
| SHA256 | |
| Sample Name | |
| File Size |
1.1 MB 1139712 Bytes |
| First Seen |
2025-02-06 09:14 UTC+0000 1 year, 1 month ago. |
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86-32 (PE32) |
| Compile Time |
2020-07-20 12:02 5 years, 8 months ago. |
| Image Base |
0x400000
|
| Entry Point |
0xf0d34
|
PEID Signatures
Borland_Delphi_40_additionalMicrosoft_Visual_Cpp_v50v60_MFCBorland_Delphi_30_additionalBorland_Delphi_30_Borland_Delphi_Setup_ModuleBorland_Delphi_40Borland_Delphi_v40_v50BobSoft_Mini_Delphi_BoB_BobSoft_additionalBorland_Delphi_v60_v70Borland_Delphi_v30Borland_Delphi_DLL
Important Imports
- UnhookWindowsHookEx
- CallNextHookEx
- IsDebuggerPresent
- SuspendThread
- VirtualAlloc
- CreateProcessW
- ResumeThread
- GetDesktopWindow
- GetClipboardData
- RegSetValueExW
- RegConnectRegistryW
- RegEnumKeyExW
- RegLoadKeyW
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
Matching Rules
| Rule Name | Rule Type |
|---|---|
| Detect QEMU Registry Artifacts | YARA |
| Detect GetForegroundWindow Usage | YARA |
| Detect Encryption Artifacts | YARA |
| Detect VirtualBox Registry Artifacts | YARA |
| Detect BobSoft Packer | YARA |
Matching Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) | Rules(s) |
|---|---|---|---|---|
| Detecting Virtual Environment Artefacts | U1332 |
|
||
| Cryptography | U0703 E1027.m04 |
|
||
| Wiping or Encrypting | U0301 |
|
||
| BobSoft Mini Delphi Packer | U1428 |
|