Short facts:
WannaCry is a large-scale malware that appeared in May 2017, primarily attacking computers running with the operating system Windows 7 and Windows XP. The malware works as ransomware. It encrypts the data of the affected computer and asks the user for a ransom for decryption. A special feature of WannaCry is the second functionality of a computer worm, which allowed the sudden spread in almost 100 countries.
Background: In the morning of May 12, 2017(9:22 clock world time), a massive infection of Windows computers by a novel malware occurred. Within one day, more than 230,000 computers were affected worldwide. In addition to many private computers running Windows 7 or Windows XP operating systems, it also affected industrial equipment, critical infrastructures, and government agencies. The ransomware is commonly referred to as WannaCry, but is also known under the name Wcrypt, WCRY, WannaCrypt or Wana Decrypt0r 2.0.
Special features of the malware WannaCry
Ransomware is no news in the field of cybercrime. WannaCry stands out from previous cyber attacks, however, due to its aggressive retransmission. In addition to the pure ransomware function, WannaCry also uses the function of a worm virus. This specifically uses the Windows exploit code called EternalBlue and the backdoor tool DoublePulsar.
So far, it has not been conclusively clarified how the initial infection took place. Typically, ransomware is spatially limited and takes a relatively cumbersome path from phishing emails to infected files or broken links. However, because of the worm function, WannaCry probably needed only a small number of seed machines to spread quickly.
Construction of WannaCry
WannaCry uses two exploits for vulnerabilities in Windows operating systems:
WannaCry consists of two components, which are introduced by means of a dropper in the form of a Trojan in the system
How WannaCry works
After an initial check for a connection to the Killswitch URL (if they are blocked by the system or the domain is not yet active, the dropper becomes active), the malware creates a service called mssecsvc2.0. The service receives the display name Microsoft Security Center (2.0) Service. This scans both the local network and the Internet for other potential computers with EternalBlue vulnerability and infects them. This feature ensures fast retransmission.
The dropper then extracts the WannaCry Ransomware (tasksche.exe) and executes it. Also, the ransomware checks for the time being on a Killswitch in the form of an exclusion software called "MsWinZonesCacheCounterMutexA0" and only goes to the next step, if it is not found in the system.
Subsequently, WannaCry sets all attributes of the files to "hidden" and gives full access to files in the current folder and the folders below it. As a next step, all files are encrypted and given the extension ".WNCRY". Each folder will create a "@ Please_Read_Me @ .txt" text file containing the instructions for the ransom payment.
In addition, a registry key is created which points to the location of the .exe and deletes all backups and system states after encryption has been completed.
Finally, the malware replaces the current desktop wallpaper with a notification and starts a .exe with the ransom note, a timer and instructions for payment and decryption.
Spread of the malware
In fact, WannaCry's May campaign was the third wave and second version of the malware.
Affected companies
According to current status the worm affected breakdowns and disorders at many companies and institutions. Amongst others:
Modifications of WannaCry
Since the May campaign, there have been many variations of the WannaCry malware, which were implemented by other authors (copycats). Thus, the WannaCry version without Killswitch imitators is already attributed. Other interesting modifications are:
Origin of WannaCry
Metadata analysis of the RFT files indicates that the author of the malware had set English and Korean as the default language on his machine. The creator of the files is called "Messi", probably based on the Italian football player. The timestamps of the last edits and compilation of the files suggest that the author sits in one of the time zones UT + 3 (altitude Sudan, Turkey, Ukraine, Russia) to UT + 12 (altitude North Korea, New Zealand). Parts of the code for the first WannaCry version were assigned to the Lazarus group, which is said to be associated with the North Korean government. Actual evidence is not available.
The interpretation of this metadata is so far disputed. Thus, the Korean ransom demand shows the worst quality of all language versions. The processing times extracted from the metadata also indicate that the author first edited the English language file before opening any further ones. It is also interesting to note that WannaCry 1.0, the first wave malware in March 2017, was delivered in English only. Only with the May campaign another 27 languages were added. Most of the time, the author spent editing the simplified Chinese file, while only needed one minute for the traditional Chinese file.
However, all of these clues could be deliberate tracks to avoid real attribution. So far, there is no reliable indication of who the author was or where it came from.
Why did IT security technologies fail at WannaCry?
WannaCry was able to spread so rapidly for two reasons:
In addition, the malware within the system could probably operate undetected, because IT security technologies only monitored the "gates" to and from the system. However, they lack the relevant insight into the system.
Could the malware have been detected?
A solution with real-time anomaly detection based on Deep Packet Inspection technology would have detected and reported the attack early.
The anomaly detection would have detected the cyberattack at the first steps as a new, unusual communication in the network and reported to the network administrator. Presumably, the primary infection would not have been averted, but proliferation via the early detection and blocking of new communication would have been severely limited and slowed down.
Sources:
https://logrhythm.com/de/blog/a-technical-analysis-of-wannacry-ransomware/
https://blogs.technet.microsoft.com/mmpc/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/
http://blog.en.elevenpaths.com/2017/06/wannacry-chronicles-messi-korean.html
http://blog.trendmicro.com/trendlabs-security-intelligence/slocker-mobile-ransomware-starts-mimicking-wannacry/
https://blog.malwarebytes.com/threat-analysis/malware-threat-analysis/2017/07/all-this-eternalpetya-stuff-makes-me-wannacry/