ID |
C0063 |
Objective(s) |
File System |
Related ATT&CK Techniques |
None |
Version |
2.3 |
Created |
30 August 2021 |
Last Modified |
30 April 2024 |
Malware moves a file.
Tool: capa |
Mapping |
APIs |
move file |
Move File (C0063) |
kernel32.MoveFile, kernel32.MoveFileEx, MoveFileWithProgress, MoveFileTransacted, rename, _wrename, System.IO.FileInfo::MoveTo, System.IO.File::Move, kernel32.SHFileOperation |
Tool: CAPE |
Class |
Mapping |
APIs |
move_file_on_reboot |
move_file_on_reboot |
Move File (C0063) |
MoveFileWithProgressTransactedA, MoveFileWithProgressTransactedW |
File System::Move File
SHA256: bb8c0e477512adab1db26eb77fe10dadbc5dcbf8e94569061c7199ca4626a420
Location: 0x41a61d
push 0x4 ; option to delay move until the next reboot
push edi ; new name for the moved file
lea eax, [ebp + 0xffffefc4]
push eax ; name of the file to be moved
call dword ptr [->KERNEL32.DLL::MoveFileExW] ; Windows API function to move the file from one name to another
[1] capa v4.0, analyzed at MITRE on 10/12/2022