WannaCrypt ransomware worm targets out-of-date systems

Discussion in 'malware problems & news' started by ronjor, May 13, 2017.

  1. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Thanks dear!
     
    Last edited: May 16, 2017
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Very interesting ransomware esp due to its large scale deployment. I played with it very shortly. No time for detailed testing, albeit crude one.

    First one is Comodo sandbox.
     

    Attached Files:

    • csb.jpg
      csb.jpg
      File size:
      186.5 KB
      Views:
      19
  3. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Sandboxie is the next.
     

    Attached Files:

    • sbie.jpg
      sbie.jpg
      File size:
      182.2 KB
      Views:
      21
  4. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    I can't top testing GesWall even if it is dead.
     

    Attached Files:

  5. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Hi aigle, aka, Tester !

    I'm not set up to test anymore, so, always interested in your efforts.

    Do I interpret correctly, that all of the dropper exes were caught?

    thanks,

    ----
    rich
     
  6. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    And lastly Comodo HIPS - lot of pop ups but I will only show some of them.
     

    Attached Files:

  7. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Hi, I was too busy but could not stop myself. As I told above I did not check in detail but in case of GesWall, Sandboxie and Comodo Sandbox everything seemed sandboxed and my files were not encrypted. Regarding Comodo HIPS I tested even more briefly, there were so many pop ups but I am sure it will stop the ransomware dead.
     
  8. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Thanks for your efforts - I know it takes time. I remember our AE and HIPS tests from years ago!

    ----
    rich
     
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    You are such a tease :)

    Very nice walk with CFW. HIPS :thumb:
     
  10. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    No proof, Pete - just speculations.

    Take your choice!:

    http://www.csmonitor.com/Technology...could-be-behind-ransomware-attack-say-experts

    http://www.csmonitor.com/Technology/2017/0516/What-caused-the-global-WannaCry-ransomware-attack
    And so it goes...

    ----
    rich
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    http://news.softpedia.com/news/hero...-spread-awarded-10k-by-hackerone-515774.shtml

    :thumb:
     
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  13. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Aigle- If in Comodo the sandbox is set to a proper level there is absolutely no need for the HIPS to be enabled at all- therefore no popups.
     
  14. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Hi, Regarding the testing, I tested Comodo sandbox and HIPS separately. When I was testing the DefencePlus, auto-sandbox was disabled.

    Otherwise in day to day use I agree that if auto-sandbox is enabled, HIPS are not needed. However I am not yet sure if it is true about fileless malware mitigation too. Will need to re-check. Fileless malware mitigation was introduced in the last version.
     
    Last edited: May 17, 2017
  15. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    @aigle - did you do your testing on a patched PC, i.e. all Win updates applied? If so, this confirms my previous assumption that this ransomware will still run w/o employing the NSA exploits.
     
    Last edited: May 17, 2017
  16. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    3 Security Firms Say WannaCry Ransomware Shares Code with North Korean Malware
    https://www.bleepingcomputer.com/ne...omware-shares-code-with-north-korean-malware/
     
  17. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  18. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
     
  19. Trooper

    Trooper Registered Member

    Joined:
    Jan 26, 2005
    Posts:
    5,508
    What did ESET say about the backdoor possibility?
     
  20. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Unpatched Win7 VM.
     
  21. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    the NSA exploit only gets the malware to you after that it runs. There is a standalone version that can be tested. BTW has anyone noticed the 2nd protection under the crytoguard tab in HMPA. One of them is for the MBR and the other is for SMB.
     
  22. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Could you test on a patched ver. of Win 7? Still want to know if it will try to execute. Also if you fire up Process Monitor you could trace exactly what this bugger is doing.
     
    Last edited: May 17, 2017
  23. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    If anyone still has concerns over this malware, @aigle screenshots shows a .bat execution followed by a cmd.exe execution. So anyone currently monitoring script and cmd.exe would have caught this malware in the startup phase. I assume the cmd.exe execution is to run sc.exe -hidden to create the service the malware uses. Also don't believe this would have worked under a SUA since sc.exe requires at least limited admin privileges.

    This also calms my fear that the malware was using RPC over SMB to run Service Control Manager remotely. To do so, the malware would need admin privledges.
     
    Last edited: May 17, 2017
  24. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  25. Trooper

    Trooper Registered Member

    Joined:
    Jan 26, 2005
    Posts:
    5,508
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.