<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

Cylance vs Malware Posing as a Sneaky Flash Installer

Cylance vs Malware Posing as a Sneaky Flash Installer

Cylance VS sneaky malware
Posted by ASCEND TECHNICAL TEAM on 7/28/17 4:51 PM

<< Back to Blog

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Unless you have Cylance.

Recently, we noticed such a hit with one of our customers in the financial world. We received an alarm out of our SIEM that Cylance had quarantined something suspicious that was posing as a flash installer, flashplayer[1].exe.


The Detected Quarantined File

I was able to see that it was located at the following file path:

file path of analyzed malware

Looking for a quick win, I checked the hash against the VirusTotal database to get some more information. At the time, there was nothing detected. We’re now up to 33 out of 57 tier 1 vendors. I’m seeing references to Artemis, which is a fairly known trojan. I wish I would had this information before. Well I didn’t, so I needed to do some further digging.

Looking further into the information that Cylance was able to pull out, I was able to see right away that the metadata didn’t match up. The product name was coming up as Undeludable with a company name of Slips.

Metadata within the malware file shows a strange company name

Furthermore, the certificate was issued by Comodo, not Adobe. The publisher was a company called “BITT” LLC. Five minutes of web searching directed me to a site that was under construction.

Malware metadata with timestamp and publisher source

The detailed threat data out of Cylance showed Undeludable again but now I was also seeing that the original file name was referencing Unorganic8.exe. We’re definitely not dealing with Flashplayer at this point. Now I’m curious. At this time I notified the customer that we may have just saved their bacon and kept digging.

Next I was able to see that this file imports MSVBVM60.DLL. This is the Visual Basic Virtual Machine. So now we have something that’s using VB and is doing process injection. I was able to pull out DllFunctionCall, an API (Application Programming Interface) function, as well.

I ran strings against the executable and wasn’t able to get much. However, I did get some clues. For instance, I could see very obvious attempts to confuse any clear text information.


Anything that was cleartext gave references to Visual Basic again as well as some wording that appeared to be giberish. Some research shows that these might actually be words in other languages. For example:

Tekstilets – Finnish
Beluringen – Norwegian
Lithuria – Albanian
Leveringssikkerheds – Danish

Additional files that were attempted to be installed, (droppers), included emese.exe and a hash


Flash Installer References Not Adding Up

At the time of the hit, analysis in VirusTotal didn’t get me much. Now, I can see that this is where our pal Artemis can be found.

While looking more into the behavior, I found references to the following:

C:\Documents and Settings\Administrator\Local Settings\Application Data\emese\emese.exe
c:\documents and settings

Since when did Flash Player need to access PowerShell?

Additionally, there was even more fun in the registry:

More references to VBA, but what was even more interesting were references to Wireshark!

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Wireshark.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Wireshark.exe

In addition to a number of web proxies:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Fiddler.exe

Analyzer for incoming and outgoing traffic


XK72 Ltd folder

So far, I haven’t seen a single reference to flash.


Cylance Analysis

At this point, I kicked this over to Cylance to let them sandbox this and get more detail. This is what I got from one of the reps we work with:

“The sample is not Adobe Flash Player. It is signed with an adware-associated Authenticode certificate, but exhibits Trojan behavior. When executed, the sample creates several instances of regsvr.exe, and injects itself into them. After the sample’s process exits, the regsvr.exe instances make a large number of outbound connections to remote servers on ports 80 and 443. The sample downloads and stores a payload in the Windows registry, which is executed through a line of Javascript that is also stored in the registry. During the course of the investigation, the file was determined to be a Malware Trojan.”

These are the IPs that it was calling out to: – Korea – Japan – Australia – USA AT&T – Canada – Google – Mexico – Ecuador – China – Korea – India – Arizona, USA – Arizona, USA – Arizona, USA – Ohio, USA


Predictive and Preventive

All in all, most of these were major TelCo’s and ISP’s from around the world. Nothing coming back to Adobe though. Once some static analysis was done it was obvious the file was malware, but I have seen malware that’s pretty good about masking itself.

Had our customer had an AV (Antivirus) product that relied on signatures or VirusTotal, rather than Cylance, it would have resulted in an infected machine and possible lost information. This post would have been more about how we do incident response instead of how we prevented the malware attack to begin with.

Written By: Derrick Masters, Security Engineer


<< Back to Blog

Posted in Malware Prevention, Endpoint Security, Cybersecurity