Analysis by: John Anthony Banes

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Exploit

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel: Downloaded from the Internet, Dropped by other malware

This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows. Users affected by this malware may find malicious routines exhibited on their systems.

This Exploit may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.

It takes advantage of certain vulnerabilities.

  TECHNICAL DETAILS

File Size: (Varies) bytes
File Type: EXE, HTA, PY
Memory Resident: No
Initial Samples Received Date: 14 Apr 2017
Payload: Terminates processes, Steals information

Arrival Details

This Exploit may arrive bundled with malware packages as a malware component.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It may be manually installed by a user.

Other Details

This Exploit does the following:

  • It uses plugins that has the following capabilities:
    • Check current user privileges and attempt to elevate privileges if user has no admin rights
    • Check if the running IIS version of target machine is vulnerable
    • Check if the target machine is running some Remote Procedure Call
    • Check target machine's secure connection status
    • Code Execution
    • Deliver exploits for Windows
    • Drop and/or execute files to target machine
    • Enable or Disable NTML protocol security
    • Implant Payload from file
    • Inject code into a remote process
    • Retrieve target machine's IIS version
    • Retrieve target machine's WorldClient version
    • Test plugin communication
    • Upgrade or Uninstall plugins
    • Use false positive password hashes to authenticate user

It takes advantage of the following vulnerabilities:

  SOLUTION

Minimum Scan Engine: 9.850
FIRST VSAPI PATTERN FILE: 13.342.07
FIRST VSAPI PATTERN DATE: 15 Apr 2017
VSAPI OPR PATTERN File: 13.343.00
VSAPI OPR PATTERN Date: 16 Apr 2017

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as TROJ_EQUATED.G. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:

Step 3

Download and apply these security patches Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.


Did this description help? Tell us how we did.