There is no description at this point.
rule win_pwnpos_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-01-25" version = "1" description = "Detects win.pwnpos." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.pwnpos" malpedia_rule_date = "20230124" malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686" malpedia_version = "20230125" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 68???????? bb05000000 52 899c2468020000 e8???????? 83c40c } // n = 6, score = 100 // 68???????? | // bb05000000 | mov ebx, 5 // 52 | push edx // 899c2468020000 | mov dword ptr [esp + 0x268], ebx // e8???????? | // 83c40c | add esp, 0xc $sequence_1 = { 8b4508 c7400801000000 8b4808 8b0c8d84644400 } // n = 4, score = 100 // 8b4508 | mov eax, dword ptr [ebp + 8] // c7400801000000 | mov dword ptr [eax + 8], 1 // 8b4808 | mov ecx, dword ptr [eax + 8] // 8b0c8d84644400 | mov ecx, dword ptr [ecx*4 + 0x446484] $sequence_2 = { 8d8dbcf9ffff 3985b4f9ffff 8b85a0f9ffff 7306 8d85a0f9ffff 51 } // n = 6, score = 100 // 8d8dbcf9ffff | lea ecx, [ebp - 0x644] // 3985b4f9ffff | cmp dword ptr [ebp - 0x64c], eax // 8b85a0f9ffff | mov eax, dword ptr [ebp - 0x660] // 7306 | jae 8 // 8d85a0f9ffff | lea eax, [ebp - 0x660] // 51 | push ecx $sequence_3 = { 3bf7 0f95c0 85c0 792c 8b550c 8b45f8 52 } // n = 7, score = 100 // 3bf7 | cmp esi, edi // 0f95c0 | setne al // 85c0 | test eax, eax // 792c | jns 0x2e // 8b550c | mov edx, dword ptr [ebp + 0xc] // 8b45f8 | mov eax, dword ptr [ebp - 8] // 52 | push edx $sequence_4 = { 8b56f8 8b4204 c74430f8???????? 8b4ee8 8b5104 c74432e848ed4300 8b4df4 } // n = 7, score = 100 // 8b56f8 | mov edx, dword ptr [esi - 8] // 8b4204 | mov eax, dword ptr [edx + 4] // c74430f8???????? | // 8b4ee8 | mov ecx, dword ptr [esi - 0x18] // 8b5104 | mov edx, dword ptr [ecx + 4] // c74432e848ed4300 | mov dword ptr [edx + esi - 0x18], 0x43ed48 // 8b4df4 | mov ecx, dword ptr [ebp - 0xc] $sequence_5 = { 83c702 83c102 89bd34ffffff 898d40ffffff 3bfa 0f826afeffff 8a8547ffffff } // n = 7, score = 100 // 83c702 | add edi, 2 // 83c102 | add ecx, 2 // 89bd34ffffff | mov dword ptr [ebp - 0xcc], edi // 898d40ffffff | mov dword ptr [ebp - 0xc0], ecx // 3bfa | cmp edi, edx // 0f826afeffff | jb 0xfffffe70 // 8a8547ffffff | mov al, byte ptr [ebp - 0xb9] $sequence_6 = { 83c404 c745fcffffffff 83bd78ffffff10 c745e80f000000 895de4 885dd4 } // n = 6, score = 100 // 83c404 | add esp, 4 // c745fcffffffff | mov dword ptr [ebp - 4], 0xffffffff // 83bd78ffffff10 | cmp dword ptr [ebp - 0x88], 0x10 // c745e80f000000 | mov dword ptr [ebp - 0x18], 0xf // 895de4 | mov dword ptr [ebp - 0x1c], ebx // 885dd4 | mov byte ptr [ebp - 0x2c], bl $sequence_7 = { 8b4c2424 51 8d4c2458 e8???????? eb2d 8b542434 } // n = 6, score = 100 // 8b4c2424 | mov ecx, dword ptr [esp + 0x24] // 51 | push ecx // 8d4c2458 | lea ecx, [esp + 0x58] // e8???????? | // eb2d | jmp 0x2f // 8b542434 | mov edx, dword ptr [esp + 0x34] $sequence_8 = { 50 e8???????? 83c404 c745fcffffffff 83bd78ffffff10 } // n = 5, score = 100 // 50 | push eax // e8???????? | // 83c404 | add esp, 4 // c745fcffffffff | mov dword ptr [ebp - 4], 0xffffffff // 83bd78ffffff10 | cmp dword ptr [ebp - 0x88], 0x10 $sequence_9 = { 7567 8b8c15acfeffff 8b11 8b5228 6a01 6a02 57 } // n = 7, score = 100 // 7567 | jne 0x69 // 8b8c15acfeffff | mov ecx, dword ptr [ebp + edx - 0x154] // 8b11 | mov edx, dword ptr [ecx] // 8b5228 | mov edx, dword ptr [edx + 0x28] // 6a01 | push 1 // 6a02 | push 2 // 57 | push edi condition: 7 of them and filesize < 638976 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY