Created the Monday 18 March 2019. Updated 3 years, 6 months ago.
Every exe file contain metadata that allow users to trust the third party that distribute the program. Malware are able to usurp the metadata in order to fool the user but also the security tools.
rule: meta: name: impersonate file version information namespace: anti-analysis/anti-forensic authors: - email@example.com description: Looks for Windows API calls associated with reading and then writing file version information of executables on disk. Malware can use these calls to overwrite its own version information with that of a legitimate executable on the system (for instance, explorer.exe) to make it appear to be a legitimate application. scope: function att&ck: - Defense Evasion::Indicator Removal on Host [T1070] references: - https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-updateresourcea - https://www.carbonblack.com/blog/threat-analysis-dont-forget-about-kangaroo-ransomware/ examples: - e5369ac309f1be6d77afeeb3edab0ed8:0x4025A0 features: - and: - match: get file version info - api: kernel32.BeginUpdateResource - api: kernel32.UpdateResource - api: kernel32.EndUpdateResource