SYMBOLCOMMON_NAMEaka. SYNONYMS
win.touchmove (Back to overview)

TOUCHMOVE

Actor(s): Lazarus Group


There is no description at this point.

References
2023-03-09MandiantMandiant Intelligence
@online{intelligence:20230309:stealing:3112fc7, author = {Mandiant Intelligence}, title = {{Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970}}, date = {2023-03-09}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970}, language = {English}, urldate = {2023-03-13} } Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970
CLOUDBURST TOUCHMOVE TOUCHSHIFT
2022-09-30ESET ResearchPeter Kálnai
@online{klnai:20220930:amazonthemed:bf959b5, author = {Peter Kálnai}, title = {{Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium}}, date = {2022-09-30}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/}, language = {English}, urldate = {2023-11-27} } Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
BLINDINGCAN FudModule HTTP(S) uploader LambLoad TOUCHMOVE
Yara Rules
[TLP:WHITE] win_touchmove_auto (20230715 | Detects win.touchmove.)
rule win_touchmove_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.touchmove."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.touchmove"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { cc 4883ec48 488364243000 8364242800 41b803000000 488d0d38520000 4533c9 }
            // n = 7, score = 100
            //   cc                   | dec                 esp
            //   4883ec48             | lea                 ecx, [0xffff85eb]
            //   488364243000         | inc                 esp
            //   8364242800           | mov                 ah, byte ptr [edx]
            //   41b803000000         | inc                 ebp
            //   488d0d38520000       | test                ah, ah
            //   4533c9               | jne                 0x26c

        $sequence_1 = { 0f843f040000 48833d????????00 0f8431040000 488d9520230000 488bcb ff15???????? }
            // n = 6, score = 100
            //   0f843f040000         | ret                 
            //   48833d????????00     |                     
            //   0f8431040000         | inc                 eax
            //   488d9520230000       | push                ebx
            //   488bcb               | dec                 eax
            //   ff15????????         |                     

        $sequence_2 = { 8bcb e8???????? e9???????? 488b442450 488d0d8bdc0000 488b04c1 41f644070840 }
            // n = 7, score = 100
            //   8bcb                 | mov                 edi, eax
            //   e8????????           |                     
            //   e9????????           |                     
            //   488b442450           | mov                 edx, eax
            //   488d0d8bdc0000       | mov                 ecx, 0x40
            //   488b04c1             | xor                 edx, edx
            //   41f644070840         | inc                 ecx

        $sequence_3 = { 83e11f 48c1f805 486bc958 48030cc2 eb07 488d0d14f90000 f6410820 }
            // n = 7, score = 100
            //   83e11f               | inc                 ecx
            //   48c1f805             | pop                 edi
            //   486bc958             | xor                 eax, eax
            //   48030cc2             | dec                 eax
            //   eb07                 | or                  ecx, 0xffffffff
            //   488d0d14f90000       | dec                 eax
            //   f6410820             | lea                 edi, [ebp + 0x50]

        $sequence_4 = { 442bd2 41ffc0 4181e007000080 7d0a 41ffc8 4183c8f8 41ffc0 }
            // n = 7, score = 100
            //   442bd2               | dec                 eax
            //   41ffc0               | sub                 esp, 0x20
            //   4181e007000080       | test                byte ptr [edx + 0x18], 0x40
            //   7d0a                 | dec                 ecx
            //   41ffc8               | mov                 ebx, eax
            //   4183c8f8             | dec                 eax
            //   41ffc0               | lea                 eax, [esp + 0x40]

        $sequence_5 = { 4c8bef 49c1fd05 4c8d35d4db0000 83e31f 486bdb58 4b8b04ee 0fbe4c1808 }
            // n = 7, score = 100
            //   4c8bef               | mov                 dword ptr [ebp + 0x1328], 0x737365
            //   49c1fd05             | mov                 dword ptr [ebp + 0x720], 0x56746547
            //   4c8d35d4db0000       | mov                 dword ptr [ebp + 0x724], 0x69737265
            //   83e31f               | mov                 dword ptr [ebp + 0x728], 0x78456e6f
            //   486bdb58             | mov                 word ptr [ebp + 0x72c], 0x57
            //   4b8b04ee             | mov                 dword ptr [ebp + 0x1530], 0x72747441
            //   0fbe4c1808           | mov                 dword ptr [ebp + 0x1534], 0x74756269

        $sequence_6 = { 4533c9 458bc6 ba00000080 488d8d904d0000 ff15???????? 488bd8 4883f8ff }
            // n = 7, score = 100
            //   4533c9               | dec                 ecx
            //   458bc6               | mov                 ecx, dword ptr [edi + ecx]
            //   ba00000080           | dec                 eax
            //   488d8d904d0000       | lea                 edx, [esp + 0x70]
            //   ff15????????         |                     
            //   488bd8               | dec                 eax
            //   4883f8ff             | mov                 ecx, edi

        $sequence_7 = { ff15???????? 85c0 7577 c744246800010000 488d442468 4889442428 488d8580480000 }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   85c0                 | add                 ecx, eax
            //   7577                 | dec                 eax
            //   c744246800010000     | lea                 eax, [0xa0d6]
            //   488d442468           | inc                 esp
            //   4889442428           | movzx               ecx, byte ptr [ecx + eax]
            //   488d8580480000       | inc                 ecx

        $sequence_8 = { 488905???????? ff15???????? 48833d????????00 488905???????? 0f8477040000 48833d????????00 }
            // n = 6, score = 100
            //   488905????????       |                     
            //   ff15????????         |                     
            //   48833d????????00     |                     
            //   488905????????       |                     
            //   0f8477040000         | xor                 ecx, ecx
            //   48833d????????00     |                     

        $sequence_9 = { 8bf8 8bd0 b940000000 ff15???????? }
            // n = 4, score = 100
            //   8bf8                 | nop                 word ptr [eax + eax]
            //   8bd0                 | movzx               edx, byte ptr [ecx]
            //   b940000000           | dec                 eax
            //   ff15????????         |                     

    condition:
        7 of them and filesize < 224256
}
[TLP:WHITE] win_touchmove_w0   (20230705 | Detects win.touchmove. Based on the yara-signator's win_touchmove_auto, manually adjusted.)
rule win_touchmove_w0 {

    meta:
        author = ""
        date = "2023-07-03"
        version = "1"
        description = "Detects win.touchmove. Based on the yara-signator's win_touchmove_auto, manually adjusted."
        hash = "3D988AA9D79EF06BCEE5E4A4FED4EFDC1047A3456969E7DCE3C5B27631D651B9" //SHA-1: 7F4371D557CD4EAB657EF8B62A1E21DB997AA594
        hash = "D21C5AD2A254EB6C7B0C656A317997D1C7FA7448927347ACB4687B69E70B8B5A" //SHA-1: 83CF7D8EF1A241001C599B9BCC8940E089B613FB
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.touchmove"
        malpedia_rule_date = "20230705"
        malpedia_hash = ""
        malpedia_version = "20230705"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:

        $sequence_1 = { 48 89 05 ?? ?? ?? ?? 0f 84 84 00 00 00 48 83 3d ?? ?? ?? ?? 00 74 7a 48 83 3d ?? ?? ?? ?? 00 74 70 }
            // n = 6, score = 100
            //   488905????????       |                     
            //   0f8484000000         | dec                 eax
            //   48833d????????00     |                     
            //   747a                 | test                eax, eax
            //   48833d????????00     |                     
            //   7470                 | je                  0xa44

        $sequence_2 = { 72 a6 42 81 3c 21 50 45 00 00 48 89 74 24 78 4a 8d 34 21 75 12 b8 64 86 00 00 66 39 46 04 }
            // n = 7, score = 100
            //   72a6                 | mov                 word ptr [ebp + 0x4090], 0x7265
            //   42813c2150450000     | mov                 byte ptr [ebp + 0x4092], 0
            //   4889742478           | xor                 edx, edx
            //   4a8d3421             | movdqa              xmmword ptr [ebp + 0x4280], xmm5
            //   7512                 | mov                 word ptr [ebp + 0x4290], 0x6e
            //   b864860000           | xor                 edx, edx
            //   66394604             | inc                 ecx

        /*
        0x1800024bd C78570020000DA48A314          mov dword ptr [rbp + 0x270], 0x14a348da
        0x1800024c7 C785740200008DBFE2D2          mov dword ptr [rbp + 0x274], 0xd2e2bf8d
        0x1800024d1 C78578020000EF911211          mov dword ptr [rbp + 0x278], 0x111291ef
        0x1800024db C7857C020000FF7559A3          mov dword ptr [rbp + 0x27c], 0xa35975ff
        0x1800024e5 C78580020000E16EA064          mov dword ptr [rbp + 0x280], 0x64a06ee1
        0x1800024ef C78584020000B8788977          mov dword ptr [rbp + 0x284], 0x778978b8
        0x1800024f9 C78588020000A0379158          mov dword ptr [rbp + 0x288], 0x589137a0
        0x180002503 C7858C0200005AFFFF07          mov dword ptr [rbp + 0x28c], 0x7ffff5a
        */
        $sequence_A = { C7 85 ?? ?? ?? ?? DA 48 A3 14 C7 85 ?? ?? ?? ?? 8D BF E2 D2
        C7 85 ?? ?? ?? ?? EF 91 12 11 C7 85 ?? ?? ?? ?? FF 75 59 A3
        C7 85 ?? ?? ?? ?? E1 6E A0 64 C7 85 ?? ?? ?? ?? B8 78 89 77
        C7 85 ?? ?? ?? ?? A0 37 91 58 C7 85 ?? ?? ?? ?? 5A FF FF 07 } //256-bit key

        /*
        0x180001070 8B41FC                        mov eax, dword ptr [rcx - 4]
        0x180001073 4883C104                      add rcx, 4
        0x180001077 2D4786C861                    sub eax, 0x61c88647
        0x18000107c 8941FC                        mov dword ptr [rcx - 4], eax
        */
        $sequence_B = { 8B 41 FC 48 83 C1 04 2D 47 86 C8 61 89 41 FC } //RC6 key schedule

        /*
        0x18000225d 2BC8                          sub ecx, eax
        0x18000225f B8398EE338                    mov eax, 0x38e38e39
        0x180002264 83C148                        add ecx, 0x48
        0x180002267 F7E1                          mul ecx
        0x180002269 C1EA04                        shr edx, 4
        */
        $sequence_C = { 2B C8 B8 39 8E E3 38 83 C1 48 F7 E1 C1 EA 04 } //CRC-32

        $sequence_D = "LLTMapperApi.dll" wide fullword //version info

    condition:
        5 of them and filesize < 224256
}
Download all Yara Rules