Self Assessment

Malware Analysis – Supersuso

Published On : 2022-01-09
Share :
Malware Analysis – Supersuso

Supersuso is a ransomware intended to encrypt sensitive data in order to restrict access to it. During the encryption process, this malware sample adds the extension .ICQ_SUPERSUSO to mark inaccessible files. When the encryption process ends, Supersuso malware creates a ransom note #Decrypt#.txt

Malicious Sample Analysis:

MD5:CCFACEE2EBA9FCDB7FDDD4E9D7B846FF

SHA256: 8C142BFDA0D07A7E62C1D761CB9DF9B3F99F19479431DFC3F778408FE113F4C8

File Type: Windows PE-32 Executable

Subsystem: GUI

Compilation Time: Wed Sep 01 20:02:12 2021

Malware analysis SupersusoFig 1

   Fig 2

As shown in the above figure, this malware sample is a 32-bit Windows executable file, having a GUI subsystem and compile-time on 01 Sep 2021. Figure2  shows that this malware sample was not packed.

            Fig 3

These are malicious sample files detected through various anti-virus engines and most of them are detected as a Ransomware.

Fig 4

Fig 5

                 Fig 6

Fig 7

As shown in the above figures the APIs imported by the ICQ_SUPERSUSO Ransomware and indicate the following functionality/capability in the malware:

  1. Synchronization capability to handle multiple processes and threads and to access shared resources.
  2. Ability to handle windows/GUI functions.
  3. Ability to search Drives, Folders and exclude some specific files/folders from encrypting.
  4. Ability to create new threads and processes.
  5. Ability to access and manipulate access rights of the running processes.
  6. Enumeration of network resources and existing network connections.
  7. Capability to check the access rights of user.
  8. Ability to access folder paths.
  9. Dynamic memory allocation and manipulation capability.
  10. Capability to load other DLLs, libraries, and processes in memory.
  11. Capability to sleep or deactivate when want to hide itself.
  12. Ability to handle, search, open, close, write, access, perform operation and manipulating files.
  13. Ability to handle, search, access and manipulating processes in memory.
  14. Ability to encrypt files.
  15. Capability to handle command line arguments/strings of the process.
  16. Capability to create snapshots of other processes include their heaps, modules, and threads.
  17. Capability to delete all volume shadow copies on a system
  18. Capability to disable firewall
  19. Capability to terminate running process

 

Fig 8

As shown in the above fig, Countries excluded from this ICQ_SUPERSUSO ransomware attack are mentioned:

Fig 9

Disable firewall setting:

Fig 10

Delete all volume shadow copies on a system:

      Fig 11

Rarog Cryptocurrency Mining Trojan. This Ransomware terminates the  Rarog Process if found on the affected system.

Fig 12

The file is encrypted by CryptEncrpt function:

Fig 13

The Malware sample creates threat-starting and threat-calling addresses. See below code snippet and the encrypt executable file.

Fig 14

Once this malware sample is an encrypted file, this malware sample adds the extension .ICQ_SUPERSUSO  and creates a ransom note # Decrypt#.txt 

MITRE Attack Tactics and Techniques:                                                                                    

No. Tactic Technique
1 Initial Access (TA0001) T1566 Phishing
2 Execution (TA0002)

T1059  Command and Scripting Interpreter

5 Discovery (TA0007) T1083   File and Directory Discovery

T1057 Process Discovery

6 Impact (TA0040) T1486 Data Encrypted

T1490 Inhibit System Recovery

  

List of IOCs:

No. Indicator Type Remarks
1 CCFACEE2EBA9FCDB7FDDD4E9D7B846FF Hash MD5

 

Recommendations:

  1. Ensure you have a view on your external threat landscape and your security team is receiving threat intel that is relevant
  2. Implement a complex password policy with renewal at regular intervals.
  3. Implement a Multifactor Authentication policy.
  4. Regularly update all software on all systems and networks and other devices and turn on automatic updates if possible.
  5. Implement a Role-Based access policy and restrict it to minimal as per the requirement.
  6. Implement an Internal threat management policy that trains employees on the latest threats and ransomware attacks and what to do in such scenarios.
  7. Restrict to click or open suspicious/unauthorized links and files, specifically on organization devices.
  8. Must implement regular back-ups policy, more than one backup, and keep one on a separate network and other isolated offline at a different place.
  9. Use reputatable IDS/IPS, firewall, and antivirus/anti-spam/anti-ransomware and anti-malware solutions.
  10. Regular audits are necessary from a third party.
  11. Regular vulnerability assessment and patching policy.