SYMBOLCOMMON_NAMEaka. SYNONYMS
win.winmm (Back to overview)

WinMM

Actor(s): Naikon


There is no description at this point.

References
2015-05-14Kaspersky LabsKurt Baumgartner, Maxim Golovkin
@online{baumgartner:20150514:naikon:9edea2f, author = {Kurt Baumgartner and Maxim Golovkin}, title = {{The Naikon APT}}, date = {2015-05-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/analysis/publications/69953/the-naikon-apt/}, language = {English}, urldate = {2019-12-20} } The Naikon APT
Naikon SslMM Sys10 WinMM xsPlus APT30 Naikon
2015-05Kaspersky LabsKurt Baumgartner, Maxim Golovkin
@techreport{baumgartner:201505:msnmm:13a9145, author = {Kurt Baumgartner and Maxim Golovkin}, title = {{The MsnMM Campaigns - The Earliest Naikon APTCampaigns}}, date = {2015-05}, institution = {Kaspersky Labs}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/TheNaikonAPT-MsnMM1.pdf}, language = {English}, urldate = {2019-07-11} } The MsnMM Campaigns - The Earliest Naikon APTCampaigns
SslMM Sys10 WinMM xsPlus
2015-04FireEyeFireEye
@techreport{fireeye:201504:apt30:0129bf7, author = {FireEye}, title = {{APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION}}, date = {2015-04}, institution = {FireEye}, url = {https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf}, language = {English}, urldate = {2020-01-07} } APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30
Yara Rules
[TLP:WHITE] win_winmm_auto (20230407 | Detects win.winmm.)
rule win_winmm_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-28"
        version = "1"
        description = "Detects win.winmm."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.winmm"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { e8???????? 52 50 8d432a 68???????? 50 }
            // n = 6, score = 200
            //   e8????????           |                     
            //   52                   | push                edx
            //   50                   | push                eax
            //   8d432a               | lea                 eax, [ebx + 0x2a]
            //   68????????           |                     
            //   50                   | push                eax

        $sequence_1 = { 66837c47fe5c 7508 57 ffd3 }
            // n = 4, score = 200
            //   66837c47fe5c         | cmp                 word ptr [edi + eax*2 - 2], 0x5c
            //   7508                 | jne                 0xa
            //   57                   | push                edi
            //   ffd3                 | call                ebx

        $sequence_2 = { 33c0 33d2 c3 55 8bec 56 ff7514 }
            // n = 7, score = 200
            //   33c0                 | xor                 eax, eax
            //   33d2                 | xor                 edx, edx
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   56                   | push                esi
            //   ff7514               | push                dword ptr [ebp + 0x14]

        $sequence_3 = { 8be8 668b06 6685c0 74c9 50 e8???????? }
            // n = 6, score = 200
            //   8be8                 | mov                 ebp, eax
            //   668b06               | mov                 ax, word ptr [esi]
            //   6685c0               | test                ax, ax
            //   74c9                 | je                  0xffffffcb
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_4 = { 03f5 ebe9 33ed 66833e2e }
            // n = 4, score = 200
            //   03f5                 | add                 esi, ebp
            //   ebe9                 | jmp                 0xffffffeb
            //   33ed                 | xor                 ebp, ebp
            //   66833e2e             | cmp                 word ptr [esi], 0x2e

        $sequence_5 = { c9 c3 8bc1 6a01 59 33d2 }
            // n = 6, score = 200
            //   c9                   | leave               
            //   c3                   | ret                 
            //   8bc1                 | mov                 eax, ecx
            //   6a01                 | push                1
            //   59                   | pop                 ecx
            //   33d2                 | xor                 edx, edx

        $sequence_6 = { 8b5c241c 56 8b74241c 57 8bf9 895c2418 66833e00 }
            // n = 7, score = 200
            //   8b5c241c             | mov                 ebx, dword ptr [esp + 0x1c]
            //   56                   | push                esi
            //   8b74241c             | mov                 esi, dword ptr [esp + 0x1c]
            //   57                   | push                edi
            //   8bf9                 | mov                 edi, ecx
            //   895c2418             | mov                 dword ptr [esp + 0x18], ebx
            //   66833e00             | cmp                 word ptr [esi], 0

        $sequence_7 = { ffd3 66837c47fe5c 7508 57 ffd3 }
            // n = 5, score = 200
            //   ffd3                 | call                ebx
            //   66837c47fe5c         | cmp                 word ptr [edi + eax*2 - 2], 0x5c
            //   7508                 | jne                 0xa
            //   57                   | push                edi
            //   ffd3                 | call                ebx

        $sequence_8 = { e8???????? 59 89442428 668b06 6685c0 }
            // n = 5, score = 200
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   89442428             | mov                 dword ptr [esp + 0x28], eax
            //   668b06               | mov                 ax, word ptr [esi]
            //   6685c0               | test                ax, ax

        $sequence_9 = { c20c00 55 8bec 83ec24 83790800 7519 dd01 }
            // n = 7, score = 200
            //   c20c00               | ret                 0xc
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   83ec24               | sub                 esp, 0x24
            //   83790800             | cmp                 dword ptr [ecx + 8], 0
            //   7519                 | jne                 0x1b
            //   dd01                 | fld                 qword ptr [ecx]

    condition:
        7 of them and filesize < 278528
}
Download all Yara Rules