WannaCrypt ransomware worm targets out-of-date systems

Discussion in 'malware problems & news' started by ronjor, May 13, 2017.

  1. aigle

    aigle Registered Member

    Thanks dear!
     
    Last edited: May 16, 2017
  2. aigle

    aigle Registered Member

    Very interesting ransomware esp due to its large scale deployment. I played with it very shortly. No time for detailed testing, albeit crude one.

    First one is Comodo sandbox.
     

    Attached Files:

    • csb.jpg
      csb.jpg
      File size:
      186.5 KB
      Views:
      19
  3. aigle

    aigle Registered Member

    Sandboxie is the next.
     

    Attached Files:

    • sbie.jpg
      sbie.jpg
      File size:
      182.2 KB
      Views:
      21
  4. aigle

    aigle Registered Member

    I can't top testing GesWall even if it is dead.
     

    Attached Files:

  5. Rmus

    Rmus Exploit Analyst

    Hi aigle, aka, Tester !

    I'm not set up to test anymore, so, always interested in your efforts.

    Do I interpret correctly, that all of the dropper exes were caught?

    thanks,

    ----
    rich
     
  6. aigle

    aigle Registered Member

    And lastly Comodo HIPS - lot of pop ups but I will only show some of them.
     

    Attached Files:

  7. aigle

    aigle Registered Member

    Hi, I was too busy but could not stop myself. As I told above I did not check in detail but in case of GesWall, Sandboxie and Comodo Sandbox everything seemed sandboxed and my files were not encrypted. Regarding Comodo HIPS I tested even more briefly, there were so many pop ups but I am sure it will stop the ransomware dead.
     
  8. Rmus

    Rmus Exploit Analyst

    Thanks for your efforts - I know it takes time. I remember our AE and HIPS tests from years ago!

    ----
    rich
     
  9. EASTER

    EASTER Registered Member

    You are such a tease :)

    Very nice walk with CFW. HIPS :thumb:
     
  10. Rmus

    Rmus Exploit Analyst

    No proof, Pete - just speculations.

    Take your choice!:

    http://www.csmonitor.com/Technology...could-be-behind-ransomware-attack-say-experts

    http://www.csmonitor.com/Technology/2017/0516/What-caused-the-global-WannaCry-ransomware-attack
    And so it goes...

    ----
    rich
     
  11. Minimalist

    Minimalist Registered Member

    http://news.softpedia.com/news/hero...-spread-awarded-10k-by-hackerone-515774.shtml

    :thumb:
     
  12. Minimalist

    Minimalist Registered Member

  13. cruelsister

    cruelsister Registered Member

    Aigle- If in Comodo the sandbox is set to a proper level there is absolutely no need for the HIPS to be enabled at all- therefore no popups.
     
  14. aigle

    aigle Registered Member

    Hi, Regarding the testing, I tested Comodo sandbox and HIPS separately. When I was testing the DefencePlus, auto-sandbox was disabled.

    Otherwise in day to day use I agree that if auto-sandbox is enabled, HIPS are not needed. However I am not yet sure if it is true about fileless malware mitigation too. Will need to re-check. Fileless malware mitigation was introduced in the last version.
     
    Last edited: May 17, 2017
  15. itman

    itman Registered Member

    @aigle - did you do your testing on a patched PC, i.e. all Win updates applied? If so, this confirms my previous assumption that this ransomware will still run w/o employing the NSA exploits.
     
    Last edited: May 17, 2017
  16. itman

    itman Registered Member

    3 Security Firms Say WannaCry Ransomware Shares Code with North Korean Malware
    https://www.bleepingcomputer.com/ne...omware-shares-code-with-north-korean-malware/
     
  17. hawki

    hawki Registered Member

  18. itman

    itman Registered Member

     
  19. Trooper

    Trooper Registered Member

    What did ESET say about the backdoor possibility?
     
  20. aigle

    aigle Registered Member

    Unpatched Win7 VM.
     
  21. Peter2150

    Peter2150 Global Moderator

    the NSA exploit only gets the malware to you after that it runs. There is a standalone version that can be tested. BTW has anyone noticed the 2nd protection under the crytoguard tab in HMPA. One of them is for the MBR and the other is for SMB.
     
  22. itman

    itman Registered Member

    Could you test on a patched ver. of Win 7? Still want to know if it will try to execute. Also if you fire up Process Monitor you could trace exactly what this bugger is doing.
     
    Last edited: May 17, 2017
  23. itman

    itman Registered Member

    If anyone still has concerns over this malware, @aigle screenshots shows a .bat execution followed by a cmd.exe execution. So anyone currently monitoring script and cmd.exe would have caught this malware in the startup phase. I assume the cmd.exe execution is to run sc.exe -hidden to create the service the malware uses. Also don't believe this would have worked under a SUA since sc.exe requires at least limited admin privileges.

    This also calms my fear that the malware was using RPC over SMB to run Service Control Manager remotely. To do so, the malware would need admin privledges.
     
    Last edited: May 17, 2017
  24. itman

    itman Registered Member

  25. Trooper

    Trooper Registered Member

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice