Actor(s): Lazarus Group
There is no description at this point.
rule win_touchmove_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2024-10-31" version = "1" description = "Detects win.touchmove." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.touchmove" malpedia_rule_date = "20241030" malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4" malpedia_version = "20241030" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 41b800040000 488d8c2452010000 e8???????? 4c8d442448 488d152df90000 } // n = 5, score = 100 // 41b800040000 | movdqa xmmword ptr [ebp + 0x2220], xmm5 // 488d8c2452010000 | mov byte ptr [ebp + 0x2232], 0 // e8???????? | // 4c8d442448 | dec eax // 488d152df90000 | lea ecx, [ebp + 0xa20] $sequence_1 = { 488d157af70000 488d8d90000000 e8???????? 4c8d8590000000 33d2 33c9 } // n = 6, score = 100 // 488d157af70000 | lea ecx, [esp + 0x152] // 488d8d90000000 | mov word ptr [ebp + 0x4d90], si // e8???????? | // 4c8d8590000000 | xor edx, edx // 33d2 | inc ecx // 33c9 | mov eax, 0x400 $sequence_2 = { 7528 48833d????????00 741e 488d0d499f0000 e8???????? 85c0 } // n = 6, score = 100 // 7528 | dec eax // 48833d????????00 | // 741e | mov eax, edx // 488d0d499f0000 | and edx, 0x1f // e8???????? | // 85c0 | jae 0x99c $sequence_3 = { 41b8ee000000 488d8d92430000 e8???????? c6858044000000 33d2 41b8ff000000 488d8d81440000 } // n = 7, score = 100 // 41b8ee000000 | inc ecx // 488d8d92430000 | test byte ptr [edi + eax + 8], 0x40 // e8???????? | // c6858044000000 | je 0xd89 // 33d2 | inc ecx // 41b8ff000000 | cmp byte ptr [ebp], 0x1a // 488d8d81440000 | je 0x6bb $sequence_4 = { ff15???????? 488d442450 4889442420 458bce 4533c0 488d9580410000 48c7c102000080 } // n = 7, score = 100 // ff15???????? | // 488d442450 | mov ecx, dword ptr [esi + 0xb8] // 4889442420 | dec esp // 458bce | lea esp, [0xfd4f] // 4533c0 | lock dec dword ptr [ecx] // 488d9580410000 | jne 0x720 // 48c7c102000080 | inc esp $sequence_5 = { 0f8514010000 4c8d2d36cd0000 41b804010000 668935???????? 498bd5 ff15???????? 418d7c24e7 } // n = 7, score = 100 // 0f8514010000 | mov ecx, ebx // 4c8d2d36cd0000 | dec eax // 41b804010000 | mov ecx, ebx // 668935???????? | // 498bd5 | dec eax // ff15???????? | // 418d7c24e7 | lea edx, [ebp + 0x520] $sequence_6 = { 48833d????????00 0f844d040000 48833d????????00 0f843f040000 } // n = 4, score = 100 // 48833d????????00 | // 0f844d040000 | inc ecx // 48833d????????00 | // 0f843f040000 | mov ecx, 4 $sequence_7 = { 833d????????00 7505 e8???????? 488d3d40e00000 41b804010000 } // n = 5, score = 100 // 833d????????00 | // 7505 | dec eax // e8???????? | // 488d3d40e00000 | and dword ptr [esp + 0x30], 0 // 41b804010000 | and dword ptr [esp + 0x28], 0 $sequence_8 = { 488bfb 488bf3 48c1fe05 4c8d25bebd0000 83e71f 486bff58 } // n = 6, score = 100 // 488bfb | inc ecx // 488bf3 | mov eax, 0x98 // 48c1fe05 | dec ecx // 4c8d25bebd0000 | mov esi, ecx // 83e71f | dec ebp // 486bff58 | mov ebp, esi $sequence_9 = { 8bc8 e8???????? ebc9 488bcb 488bc3 488d1597e40000 48c1f805 } // n = 7, score = 100 // 8bc8 | inc ecx // e8???????? | // ebc9 | pop edi // 488bcb | xor eax, eax // 488bc3 | dec eax // 488d1597e40000 | or ecx, 0xffffffff // 48c1f805 | dec eax condition: 7 of them and filesize < 224256 }
rule win_touchmove_w0 { meta: author = "" date = "2023-07-03" version = "1" description = "Detects win.touchmove. Based on the yara-signator's win_touchmove_auto, manually adjusted." hash = "3D988AA9D79EF06BCEE5E4A4FED4EFDC1047A3456969E7DCE3C5B27631D651B9" //SHA-1: 7F4371D557CD4EAB657EF8B62A1E21DB997AA594 hash = "D21C5AD2A254EB6C7B0C656A317997D1C7FA7448927347ACB4687B69E70B8B5A" //SHA-1: 83CF7D8EF1A241001C599B9BCC8940E089B613FB malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.touchmove" malpedia_rule_date = "20230705" malpedia_hash = "" malpedia_version = "20230705" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $sequence_1 = { 48 89 05 ?? ?? ?? ?? 0f 84 84 00 00 00 48 83 3d ?? ?? ?? ?? 00 74 7a 48 83 3d ?? ?? ?? ?? 00 74 70 } // n = 6, score = 100 // 488905???????? | // 0f8484000000 | dec eax // 48833d????????00 | // 747a | test eax, eax // 48833d????????00 | // 7470 | je 0xa44 $sequence_2 = { 72 a6 42 81 3c 21 50 45 00 00 48 89 74 24 78 4a 8d 34 21 75 12 b8 64 86 00 00 66 39 46 04 } // n = 7, score = 100 // 72a6 | mov word ptr [ebp + 0x4090], 0x7265 // 42813c2150450000 | mov byte ptr [ebp + 0x4092], 0 // 4889742478 | xor edx, edx // 4a8d3421 | movdqa xmmword ptr [ebp + 0x4280], xmm5 // 7512 | mov word ptr [ebp + 0x4290], 0x6e // b864860000 | xor edx, edx // 66394604 | inc ecx /* 0x1800024bd C78570020000DA48A314 mov dword ptr [rbp + 0x270], 0x14a348da 0x1800024c7 C785740200008DBFE2D2 mov dword ptr [rbp + 0x274], 0xd2e2bf8d 0x1800024d1 C78578020000EF911211 mov dword ptr [rbp + 0x278], 0x111291ef 0x1800024db C7857C020000FF7559A3 mov dword ptr [rbp + 0x27c], 0xa35975ff 0x1800024e5 C78580020000E16EA064 mov dword ptr [rbp + 0x280], 0x64a06ee1 0x1800024ef C78584020000B8788977 mov dword ptr [rbp + 0x284], 0x778978b8 0x1800024f9 C78588020000A0379158 mov dword ptr [rbp + 0x288], 0x589137a0 0x180002503 C7858C0200005AFFFF07 mov dword ptr [rbp + 0x28c], 0x7ffff5a */ $sequence_A = { C7 85 ?? ?? ?? ?? DA 48 A3 14 C7 85 ?? ?? ?? ?? 8D BF E2 D2 C7 85 ?? ?? ?? ?? EF 91 12 11 C7 85 ?? ?? ?? ?? FF 75 59 A3 C7 85 ?? ?? ?? ?? E1 6E A0 64 C7 85 ?? ?? ?? ?? B8 78 89 77 C7 85 ?? ?? ?? ?? A0 37 91 58 C7 85 ?? ?? ?? ?? 5A FF FF 07 } //256-bit key /* 0x180001070 8B41FC mov eax, dword ptr [rcx - 4] 0x180001073 4883C104 add rcx, 4 0x180001077 2D4786C861 sub eax, 0x61c88647 0x18000107c 8941FC mov dword ptr [rcx - 4], eax */ $sequence_B = { 8B 41 FC 48 83 C1 04 2D 47 86 C8 61 89 41 FC } //RC6 key schedule /* 0x18000225d 2BC8 sub ecx, eax 0x18000225f B8398EE338 mov eax, 0x38e38e39 0x180002264 83C148 add ecx, 0x48 0x180002267 F7E1 mul ecx 0x180002269 C1EA04 shr edx, 4 */ $sequence_C = { 2B C8 B8 39 8E E3 38 83 C1 48 F7 E1 C1 EA 04 } //CRC-32 $sequence_D = "LLTMapperApi.dll" wide fullword //version info condition: 5 of them and filesize < 224256 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY