Scan Result:
Microsoft Store.exe
Sample Information
SHA256 | |
Sample Name | |
File Size |
4.0 MB 4245504 Bytes |
First Seen |
2024-11-23 09:34 UTC+0000 2 weeks ago. |
General
MIME Type | |
MD5 Hash | |
Architecture | Intel86 64-bit (PE32+) |
Compile Time |
2024-11-19 04:05 2 weeks, 5 days ago. |
Image Base |
0x140000000
|
Entry Point |
0x1ae7f8
|
PEID Signature
Microsoft_Visual_Cpp_80_DLL
File Meta Data
Company Name | |
File Description | |
File Version | |
Internal Name | |
Legal Copyright | |
Original Filename | |
Product Name | |
Product Version |
Important Imports
- UnhookWindowsHookEx
- CallNextHookEx
- IsDebuggerPresent
- VirtualAlloc
- CreateProcessA
- CreateProcessW
- ResumeThread
- GetDesktopWindow
- GetClipboardData
- RegSetValueExW
- RegEnumKeyExW
- RegOpenKeyExW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- HeapAlloc
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- GetProcAddress
- OleGetClipboard
Matching Rules
Rule Name | Rule Type |
---|---|
YARA_QEMU_REGISTRY | YARA |
YARA_Detect_Possible_GetForegroundWindow_Evasion | YARA |
YARA_VBOX_REGISTRY | YARA |
Yara_Detect_OutputDebugString | YARA |
YARA_XOR_Hunt | YARA |
YARA_HDDInfo | YARA |
Matching Techniques
Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
---|---|---|---|---|
Detecting Virtual Environment Artefacts | U1332 | |||
OutputDebugString | U0117 B0001.016 | |||
XOR Operation | U0701 E1027.m02 | |||
Retrieve HDD Information | U1343 |