Scan Result:
WNetWatcher.exe
Sample Information
| SHA256 | |
| Sample Name | |
| File Size |
1.3 MB 1353216 Bytes |
| First Seen |
2025-02-06 03:12 UTC+0000 1 year, 2 months ago. |
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86-64 (PE32+) |
| Compile Time |
2025-01-16 03:15 1 year, 2 months ago. |
| Image Base |
0x140000000
|
| Entry Point |
0x1b960
|
File Meta Data
| Company Name | |
| File Description | |
| File Version | |
| Internal Name | |
| Legal Copyright | |
| Product Name | |
| Product Version |
Important Imports
Matching Rules
| Rule Name | Rule Type |
|---|---|
| Detect Process Kill Techniques | YARA |
| Detect VirtualBox Registry Artifacts | YARA |
| Detect Parent Process Identification | YARA |
| Detect XOR Encoded Malicious Patterns | YARA |
Matching Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) | Rules(s) |
|---|---|---|---|---|
| Kill Process | U0403 |
|
||
| Detecting Virtual Environment Artefacts | U1332 |
|
||
| Parent Process Detection | U0404 |
|
||
| XOR Operation | U0701 E1027.m02 |
|