CARVIEW |
WannaCry
Associated Software Descriptions
Techniques Used
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service."[1][4] |
Enterprise | T1486 | Data Encrypted for Impact |
WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files.[1][4][5] |
|
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit.[5] |
Enterprise | T1210 | Exploitation of Remote Services |
WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.[1][4][2] |
|
Enterprise | T1083 | File and Directory Discovery |
WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files.[1][4] |
|
Enterprise | T1222 | .001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification |
WannaCry uses |
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
WannaCry uses |
Enterprise | T1490 | Inhibit System Recovery |
WannaCry uses |
|
Enterprise | T1570 | Lateral Tool Transfer |
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.[1] |
|
Enterprise | T1120 | Peripheral Device Discovery |
WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device.[4] |
|
Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy | |
Enterprise | T1563 | .002 | Remote Service Session Hijacking: RDP Hijacking |
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.[1] |
Enterprise | T1018 | Remote System Discovery |
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.[5] |
|
Enterprise | T1489 | Service Stop |
WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.[4][5] |
|
Enterprise | T1016 | System Network Configuration Discovery |
WannaCry will attempt to determine the local network segment it is a part of.[5] |
|
Enterprise | T1047 | Windows Management Instrumentation | ||
ICS | T0866 | Exploitation of Remote Services |
WannaCry initially infected IT networks, but by means of an exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks. [7] |
|
ICS | T0867 | Lateral Tool Transfer |
WannaCry can move laterally through industrial networks by means of the SMB service. [7] |
Groups That Use This Software
References
- Noerenberg, E., Costis, A., and Quist, N. (2017, May 16). A Technical Analysis of WannaCry Ransomware. Retrieved December 8, 2024.
- US-CERT. (2017, May 12). Alert (TA17-132A): Indicators Associated With WannaCry Ransomware. Retrieved March 25, 2019.
- Dwoskin, E. and Adam, K. (2017, May 14). More than 150 countries affected by massive cyberattack, Europol says. Retrieved March 25, 2019.
- Berry, A., Homan, J., and Eitzman, R. (2017, May 23). WannaCry Malware Profile. Retrieved March 15, 2019.
- Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.
- Pal, P. (2017, May 16). CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry. Retrieved November 22, 2024.
- Joe Slowik 2019, April 10 Implications of IT Ransomware for ICS Environments Retrieved. 2019/10/27
- FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.