There is no description at this point.
rule win_hookinjex_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-03-28" version = "1" description = "Detects win.hookinjex." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hookinjex" malpedia_rule_date = "20230328" malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d" malpedia_version = "20230407" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { e8???????? 85c0 750f b948560100 } // n = 4, score = 300 // e8???????? | // 85c0 | dec eax // 750f | mov dword ptr [esp + 0x38], eax // b948560100 | dec eax $sequence_1 = { e8???????? 833d????????00 7411 b906000000 e8???????? 488905???????? } // n = 6, score = 300 // e8???????? | // 833d????????00 | // 7411 | test eax, eax // b906000000 | jne 0x11 // e8???????? | // 488905???????? | $sequence_2 = { e8???????? 85c0 7408 803b00 7403 48ffc3 488bc3 } // n = 7, score = 300 // e8???????? | // 85c0 | and eax, 0x1f // 7408 | dec eax // 803b00 | cmp dword ptr [esp + 0x30], 0x1000 // 7403 | jb 0x2eb // 48ffc3 | dec eax // 488bc3 | mov eax, dword ptr [esp + 0x60] $sequence_3 = { e8???????? e8???????? b801000000 e9???????? 4533c9 } // n = 5, score = 300 // e8???????? | // e8???????? | // b801000000 | test eax, eax // e9???????? | // 4533c9 | jne 0x21 $sequence_4 = { e8???????? 833d????????00 7411 b903000000 e8???????? 488905???????? } // n = 6, score = 300 // e8???????? | // 833d????????00 | // 7411 | mov eax, dword ptr [esp + 0x38] // b903000000 | dec eax // e8???????? | // 488905???????? | $sequence_5 = { e8???????? 85c0 740c b913e40000 } // n = 4, score = 300 // e8???????? | // 85c0 | je 0x13 // 740c | mov ecx, 3 // b913e40000 | test eax, eax $sequence_6 = { e8???????? b90c000000 8908 8bc1 } // n = 4, score = 300 // e8???????? | // b90c000000 | cmp byte ptr [ebx], 0 // 8908 | je 0xa // 8bc1 | dec eax $sequence_7 = { e8???????? 85c0 751f 33d2 } // n = 4, score = 300 // e8???????? | // 85c0 | mov eax, dword ptr [esp + 0x38] // 751f | dec eax // 33d2 | and eax, 0x1f $sequence_8 = { 48817c243000100000 0f82dc020000 488b442460 4889442438 } // n = 4, score = 200 // 48817c243000100000 | dec eax // 0f82dc020000 | cmp dword ptr [esp + 0x30], 0x1000 // 488b442460 | jb 0x2e2 // 4889442438 | dec eax $sequence_9 = { 25001b0000 3d00120000 750a c744246401000000 } // n = 4, score = 200 // 25001b0000 | and eax, 0x1b00 // 3d00120000 | cmp eax, 0x1200 // 750a | jne 0xc // c744246401000000 | mov dword ptr [esp + 0x64], 1 $sequence_10 = { 25001b0000 3d00100000 750d c784242401000001000000 } // n = 4, score = 200 // 25001b0000 | and eax, 0x1b00 // 3d00100000 | cmp eax, 0x1000 // 750d | jne 0xf // c784242401000001000000 | mov dword ptr [esp + 0x124], 1 $sequence_11 = { 2500180000 3d00180000 750a c744247c01000000 } // n = 4, score = 200 // 2500180000 | and eax, 0x1800 // 3d00180000 | cmp eax, 0x1800 // 750a | jne 0xc // c744247c01000000 | mov dword ptr [esp + 0x7c], 1 $sequence_12 = { 25001b0000 3d00110000 750a c744245c01000000 } // n = 4, score = 200 // 25001b0000 | and eax, 0x1b00 // 3d00110000 | cmp eax, 0x1100 // 750a | jne 0xc // c744245c01000000 | mov dword ptr [esp + 0x5c], 1 $sequence_13 = { 2500180000 3d00080000 750d c784247c01000001000000 eb0b } // n = 5, score = 200 // 2500180000 | and eax, 0x1800 // 3d00080000 | cmp eax, 0x800 // 750d | jne 0xf // c784247c01000001000000 | mov dword ptr [esp + 0x17c], 1 // eb0b | jmp 0xd $sequence_14 = { 25001b0000 3d00110000 750d c784243c01000001000000 } // n = 4, score = 200 // 25001b0000 | and eax, 0x1b00 // 3d00110000 | cmp eax, 0x1100 // 750d | jne 0xf // c784243c01000001000000 | mov dword ptr [esp + 0x13c], 1 $sequence_15 = { 25001b0000 3d00100000 750a c744244401000000 } // n = 4, score = 200 // 25001b0000 | and eax, 0x1b00 // 3d00100000 | cmp eax, 0x1000 // 750a | jne 0xc // c744244401000000 | mov dword ptr [esp + 0x44], 1 condition: 7 of them and filesize < 6545408 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY