Gwisin Ransomware Targeting Korean Companies

The cases of Gwisin ransomware attacking Korean companies are recently on the rise. It is being distributed to target specific companies. It is similar to Magniber in that it operates in the MSI installer form. Yet unlike Magniber which targets random individuals, Gwisin does not perform malicious behaviors on its own, requiring a special value for the execution argument. The value is used as key information to run the DLL file included in the MSI.

As such, the file alone does not perform ransomware activities on security products of various sandbox environments, making it difficult to detect Gwisin. The ransomware’s internal DLL operates by being injected into a normal Windows process. The process is different for each infected company.

The following shows the characteristics of Gwisin that have been identified so far.

(1) Distributed in an MSI installer file form
(2) Uses the argument value used to run MSI to run internal DLL
(3) Performs ransomware behaviors by being injected into a Windows system process
(4) Contains the information of the infected company inside the DLL (displayed in the ransom note)
(5) Supports a feature to encrypt files in safe mode

When the MSI file is run, it calls the export function update() of the internal ransomware DLL. The function checks the execution argument. If it is abnormal, the function will not operate.

Figure 1. Routine for checking argument upon running MSI

At the moment of the encryption process, the ransomware is executed with the following arguments (some parts of the arguments are hidden).

> msiexec /qn /i C:\ProgramData\*****.msi SERIAL=463f********7ce7 LICENSE=7f21********5071 SMM=0 ORG=***

Among arguments that are needed to run Gwisin, SMM can have a value of 0 or 1. Normally, the routine for encrypting files is processed if the value is 0. If SMM is 1, the ransomware is installed to operate on safe mode. It first copies itself to a certain path of ProgramData and is registered as a service. It then uses bcdedit to set the boot option as safe mode. The computer is forcibly rebooted after 5 seconds. After the system is rebooted in safe mode, the registered service starts encrypting files.

Service NameCommand
a35f23725b5feab2> msiexec /qn /i C:\ProgramData\*****.msi SERIAL=463f********7ce7 LICENSE=7f21********5071 SMM=ORG=***
Registered service

When the process for verifying the argument ends, the ransomware decrypts the internal shellcode using the arguments. It then runs a normal program “certreq.exe” to inject the decrypted shellcode. The injected shellcode ultimately decrypts Gwisin to run it in the memory (besides “certreq.exe”, various normal Window processes are used to run the ransomware).

Figure 2. Process tree of Gwisin

After encrypting files, the ransomware changes the extension name to the name of the targeted company.

Figure 3. Encrypted files

The folder chosen to be encrypted contains a ransom note. The name of the note also contains the extension string such as “!!!_HOW_TO_UNLOCK_******_FILES_!!!.TXT“. The note file shows a list of stolen information and contacts.

Figure 4. Ransom note of Gwisin

Figure 5. Desktop after being infected

The Gwisin cases show that the anti-malware products are neutralized before the infection process begins. As V3 products block Gwisin ransomware using such a method in the injection process through behavior-based detection, it is necessary to enable the ‘Behavior-based Detection’ option.

Because the ransomware is installed and executed in various systems after dominating the internal system, companies must analyze how the infection happened in the first place. If the cause of the infection cannot be analyzed after a breach had occurred, another ransomware may infect the system in the future and cause a similar incident.

[File Detection]
– Ransomware/Win.Gwisin.C5214965 (2022.07.27.03)

[Behavior Detection]
– Injection/MDP.Event.M4387 (2022.07.28.00)

Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.

Categories:Malware Information

Tagged as:,,

3 2 votes
Article Rating
Subscribe
Notify of
guest

28 Comments
Inline Feedbacks
View all comments
trackback

[…] Wednesday, Korean cybersecurity experts at Ahnlab published a report on the Windows encryptor, and yesterday, security researchers […]

trackback

[…] Wednesday, Korean cybersecurity experts at Ahnlab published a report on the Windows encryptor, and yesterday, security researchers […]

trackback

[…] эксперты по кибербезопасности из Ahnlab опубликовали отчет о шифровальщике Windows, а исследователи безопасности […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] Wednesday, Korean cybersecurity experts at Ahnlab published a report on the Windows encryptor, and yesterday, security researchers […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] Wednesday, Korean cybersecurity experts at Ahnlab published a report on the Windows encryptor, and yesterday, security researchers […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] The price is used as key data to run the DLL document incorporated within the MSI.” reads the record printed by means of safety company Ahnlab. “As such, the document by myself does no longer carry […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] farmaceutyczne w tym kraju. W ubiegłym tygodniu koreańscy eksperci ds. cyberbezpieczeństwa z Ahnlab opublikowali raport dotyczący szyfratora Windows, a badacze bezpieczeństwa z ReversingLabs […]

trackback

[…] has two versions for both Windows and Linux platforms. The Windows version was reported by Ahnlab while the Linux version was disclosed by the researchers from […]

trackback

[…] has two versions for both Windows and Linux platforms. The Windows version was reported by Ahnlab while the Linux version was disclosed by the researchers from […]

trackback

[…] argument. The value is used as key information to run the DLL file included in the MSI. reads the report published by the security company Ahnlab. “As such, the file alone does not perform […]

trackback

[…] Gwisin ransomware targeting Korean companies + more information […]

trackback

[…] Wednesday, Korean cybersecurity experts at Ahnlab published a report on the Windows encryptor, and yesterday, security researchers […]

trackback

[…] also published a report on the Windows version of the ransomware family. The researchers stated that it operates in the MSI […]

trackback

[…] For more information on Gwisin’s process flow and characteristics, see ASEC blog’s Gwisin Ransomware Targeting Korean Companies (https://asec.ahnlab.com/en/37483/).  […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] Nowy ransomware GwisinLocker atakuje serwery Windows i Linux […]

trackback

[…] hari Rabu, pakar keamanan siber Korea di Ahnlab menerbitkan laporan tentang enkripsi Windows, dan kemarin, peneliti keamanan di ReversingLab […]

trackback

[…] of the identically named malware operators with a high command of the Korean language. Among the most common characteristics of Gwisin are its ability to perform malicious behavior by being injected into a Windows system process, the […]

trackback

[…] The value is used as key information to run the DLL file included in the MSI.” reads the report published by security firm Ahnlab. “As such, the file alone does not perform ransomware […]

trackback

[…] farmacêuticas no país.Na quarta-feira, especialistas coreanos em segurança cibernética da Ahnlab publicaram um relatório sobre o criptografador do Windows e, ontem, pesquisadores de segurança da […]