WCRY or WannaCry Ransomware Technical Analysis

May 24, 2017 | Views: 4816

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Welcome Back!

As you are all aware of the facts surrounding the ransomware attacks, they are increasing rapidly from past years. Consider the biggest hits till now, you will come across these well-known names i.e.
1. CryptXXX
2. Dogspectus
3. Crypto Locker
4. Petya
5. Cerber
6. Locky
Now we have WCry/WannaCry and Uiwix.

Executive Summary
Organizations affected across the world with the ransomware variant based malware known as “WCry/WannaCry”. Major Ransomware attack of its kind named “CryptoWorm”.
Capability to scan & spread based on vulnerabilities (TCP port 445-SMB), dispersal as a worm, compromise vulnerable hosts, encrypting files stored on. The worst part is that it also deletes shadow copies by using vssadmin.exe, WMIC.exe & cmd.exe (if any on the victim’s host so that will make difficult recovery model).

Note: Based on NSA’s Leaked Exploits by Shadow Broker specifically related to SMB services for Windows.

eternal

For initial exploitation of SMB vulnerability, it primarily utilizes “ETERNALBLUE”. Implantation of “DOUBLEPULSAR” backdoor happened on successful exploitation of victim’s machine for further utilization in malware installation. What If the “DOUBLEPULSAR” backdoor is already present then it has the power to install ransomware payload which makes WCry or WannaCry as “CryptoWorm”.

Analysis
Let’s start with the psychiatry based on little machinery like execution *&* encryption flow of this ransomware.

Encryption Based Analysis
WCry / WannaCry used two encryption algorithms for ransomware infection. Below are the details:
 –   AES (Advanced Encryption Standard)
 –   RSA (Ron Rivest, Adi Shamir and Leonard Adleman)

AES considered to be the well-built ciphers & would not be able to decrypt until or unless the author makes a mistake in the encryption code. Whereas RSA is also in combination with AES for unique public & private keys generation specifically for each file.

Steps for encryption by WCRY / WannaCry are;

I. Each file is encrypted by Random AES-128 Key.

II. The key is further encrypted by an RSA-2048 public key and stored in 0000000.py file.

III. Private RSA key of the above public RSA key is further encrypted by RSA Master public key.IV. The private RSA key of the RSA Master public key is known only by the “Ransomware Authors”.

Graphical presentation

 

enp

Targeted files;

 

exten

Execution Based Analysis
It begins with an initial bonfire or a killswitch (High-level view as reported other researchers too), now execution begins when a user downloads the attachments having (.js, .exe). In some circumstances, they are also related with malicious macros which can be activated when the user enables the content on a document.


Steps for encryption by WCRY / WannaCry are;
I. Exploit ETERNALBLUE & spread to other hosts.
II. The damaging process starts with laying the foundation for.
III. Starts encrypting files with above-mentioned algorithms in combination with RSA and AES.

Graphical Presentation: 

exeu

You can download a pdf version from here:

For the latest attacks and proof of concept, please subscribe and follow me at:
Website:
https://www.fishyseclab.com – https://s3curityedge.wordpress.com – https://www.cybrary.it/members/sconnect/
Facebook:
https://www.facebook.com/alitabishofficial – https://www.facebook.com/FishySecLab/ – https://www.facebook.com/s3curityedge/
Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel