Threat Type: Exploit
In the wild: Yes
Downloaded from the Internet, Dropped by other malware
This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows. Users affected by this malware may find malicious routines exhibited on their systems.
This Exploit may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
It takes advantage of certain vulnerabilities.
EXE, HTA, PY
14 Apr 2017
Terminates processes, Steals information
This Exploit may arrive bundled with malware packages as a malware component.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be manually installed by a user.
This Exploit does the following:
- It uses plugins that has the following capabilities:
- Check current user privileges and attempt to elevate privileges if user has no admin rights
- Check if the running IIS version of target machine is vulnerable
- Check if the target machine is running some Remote Procedure Call
- Check target machine's secure connection status
- Code Execution
- Deliver exploits for Windows
- Drop and/or execute files to target machine
- Enable or Disable NTML protocol security
- Implant Payload from file
- Inject code into a remote process
- Retrieve target machine's IIS version
- Retrieve target machine's WorldClient version
- Test plugin communication
- Upgrade or Uninstall plugins
- Use false positive password hashes to authenticate user
It takes advantage of the following vulnerabilities:
- CVE-2008-4250 - Vulnerability in Server Service Could Allow Remote Code Execution (958644)
- CVE-2010-2729 - Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)
- CVE-2014-6324 - Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)
- CVE-2017-0143 - Windows SMB Remote Code Execution Vulnerability
- CVE-2017-0144 - Windows SMB Remote Code Execution Vulnerability
- CVE-2017-0145 - Windows SMB Remote Code Execution Vulnerability
- CVE-2017-0146 - Windows SMB Remote Code Execution Vulnerability
- CVE-2017-0147 - Windows SMB Information Disclosure Vulnerability
- CVE-2017-0148 - Windows SMB Remote Code Execution Vulnerability
15 Apr 2017
16 Apr 2017
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Scan your computer with your Trend Micro product to delete files detected as TROJ_EQUATED.G. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Download and apply these security patches Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.
Did this description help? Tell us how we did.