<!DOCTYPE html>
<html><head>
<meta charset="UTF-8">
</head><body><p><br></p><blockquote type="cite">---------- Original Message ----------<br>From: US-CERT <US-CERT@ncas.us-cert.gov><br>To: w3hwn@arrl.net<br>Date: May 15, 2017 at 1:38 AM<br>Subject: TA17-132A: Indicators Associated With WannaCry Ransomware<br><br><table width="700" border="0" cellspacing="0" cellpadding="0" align="center" style="border-collapse: collapse;" class="mce-item-table"><tbody><tr><td style="padding: 0px;"><p><img src="http://content.govdelivery.com/attachments/fancy_images/USDHSUSCERT/2015/11/675988/us-cert-banner-700x100-2_original.png" alt="U.S. Department of Homeland Security US-CERT" width="700" height="100" style="width: 700px; height: 100px;"></p><p>National Cyber Awareness System:</p><p> </p><div class="ox-e35719d818-rss_item" style="margin-bottom: 2em;"><div class="ox-e35719d818-rss_title" style="font-weight: bold; font-size: 120%; margin: 0 0 0.3em; padding: 0;"><a href="https://www.us-cert.gov/ncas/alerts/TA17-132A">TA17-132A: Indicators Associated With WannaCry Ransomware</a></div><div class="ox-e35719d818-rss_pub_date" style="font-size: 90%; font-style: italic; color: #666666; margin: 0 0 0.3em; padding: 0;">05/12/2017 09:36 PM EDT</div><br><div class="ox-e35719d818-rss_description" style="margin: 0 0 0.3em; padding: 0;">Original release date: May 12, 2017 | Last revised: May 15, 2017<br><h3>Systems Affected</h3><p>Microsoft Windows operating systems</p><h3>Overview</h3><p>According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan. The software can run in as many as 27 different languages.</p><p>The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours, with initial reports beginning around 4:00 AM EDT, May 12, 2017. Open-source reporting indicates a requested ransom of .1781 bitcoins, roughly $300 U.S.<br><br>This Alert is the result of efforts between the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) to highlight known cyber threats. DHS and the FBI continue to pursue related information of threats to federal, state, and local government systems and as such, further releases of technical information may be forthcoming.</p><h3>Description</h3><p>Initial reports indicate the hacker or hacking group behind the WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol (RDP) compromise or through the exploitation of a critical Windows SMB vulnerability. Microsoft released a security update for the <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">MS17-010</a> vulnerability on March 14, 2017. Additionally, Microsoft released patches for <a href="http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598">Windows XP, Windows 8, and Windows Server 2003</a> operating systems on May 13, 2017. According to open sources, one possible infection vector is via phishing emails.</p><h3>Technical Details</h3><h4><em>Indicators of Compromise (IOC)</em><br><br>IOCs are provided within the accompanying <a href="https://www.us-cert.gov/sites/default/files/ALERT_TA17-132A.xlsx">.xlsx</a> file of this report.<br><br><em>Yara Signatures</em></h4><table class="ox-e35719d818-general-table" style="border-collapse: collapse;" border="1" cellspacing="0" cellpadding="5"><tbody><tr><td style="padding: 5px;"><p><code>rule Wanna_Cry_Ransomware_Generic {</code></p><p><code> meta:</code></p><p><code> description = "Detects WannaCry Ransomware on Disk and in Virtual Page"</code></p><p><code> author = "US-CERT Code Analysis Team"</code></p><p><code> reference = "not set" </code></p><p><code> date = "2017/05/12"</code></p><p><code> hash0 = "4DA1F312A214C07143ABEEAFB695D904"</code></p><p><code> strings:</code></p><p><code> $s0 = {410044004D0049004E0024}</code></p><p><code> $s1 = "WannaDecryptor"</code></p><p><code> $s2 = "WANNACRY"</code></p><p><code> $s3 = "Microsoft Enhanced RSA and AES Cryptographic"</code></p><p><code> $s4 = "PKS"</code></p><p><code> $s5 = "StartTask"</code></p><p><code> $s6 = "wcry@123"</code></p><p><code> $s7 = {2F6600002F72}</code></p><p><code> $s8 = "unzip 0.15 Copyrigh"</code></p><p><code> $s9 = "Global\WINDOWS_TASKOSHT_MUTEX"</code> </p><p> <code> <code>$</code>s10 = "Global\WINDOWS_TASKCST_MUTEX"</code> </p><p><code> $s11 = {7461736B736368652E657865000000005461736B5374617274000000742E776E7279000069636163}</code></p><p><code> $s12 = {6C73202E202F6772616E742045766572796F6E653A46202F54202F43202F5100617474726962202B68}</code></p><p><code> $s13 = "WNcry@2ol7"</code></p><p><code> $s14 = "wcry@123"</code></p><p><code> $s15 = "Global\MsWinZonesCacheCounterMutexA"</code></p><p><code> condition:</code></p><p><code> $s0 and $s1 and $s2 and $s3 or $s4 and $s5 and $s6 and $s7 or $s8 and $s9 and $s10 or $s11 and $s12 or $s13 or $s14 or $s15</code></p><p><code>}</code></p><p><code>/*The following Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license.*/</code></p><p><code>rule MS17_010_WanaCry_worm {</code></p><p><code> meta:</code></p><p><code> description = "Worm exploiting MS17-010 and dropping WannaCry Ransomware"</code></p><p><code> author = "Felipe Molina (@felmoltor)"</code></p><p><code> reference = "https://www.exploit-db.com/exploits/41987/"</code></p><p><code> date = "2017/05/12"</code></p><p><code> strings:</code></p><p><code> $ms17010_str1="PC NETWORK PROGRAM 1.0"</code></p><p><code> $ms17010_str2="LANMAN1.0"</code></p><p><code> $ms17010_str3="Windows for Workgroups 3.1a"</code></p><p><code> $ms17010_str4="__TREEID__PLACEHOLDER__"</code></p><p><code> $ms17010_str5="__USERID__PLACEHOLDER__"</code></p><p><code> $wannacry_payload_substr1 = "h6agLCqPqVyXi2VSQ8O6Yb9ijBX54j"</code></p><p><code> $wannacry_payload_substr2 = "h54WfF9cGigWFEx92bzmOd0UOaZlM"</code></p><p><code> $wannacry_payload_substr3 = "tpGFEoLOU6+5I78Toh/nHs/RAP"</code></p><p><code> condition:</code></p><p><code> all of them</code></p><p><code>}</code></p></td></tr><tr><td style="padding: 5px;"> </td></tr></tbody></table><h4><br><br><em>Initial Analysis</em></h4><p>The WannaCry ransomware received and analyzed by US-CERT is a loader that contains an AES-encrypted DLL. During runtime, the loader writes a file to disk named “t.wry”. The malware then uses an embedded 128-bit key to decrypt this file. This DLL, which is then loaded into the parent process, is the actual Wanna Cry Ransomware responsible for encrypting the user’s files. Using this cryptographic loading method, the WannaCry DLL is never directly exposed on disk and not vulnerable to antivirus software scans.</p><p>The newly loaded DLL immediately begins encrypting files on the victim’s system and encrypts the user’s files with 128-bit AES. A random key is generated for the encryption of each file.</p><p>The malware also attempts to access the IPC$ shares and SMB resources the victim system has access to. This access permits the malware to spread itself laterally on a compromised network. However, the malware never attempts to attain a password from the victim’s account in order to access the IPC$ share.</p><p>This malware is designed to spread laterally on a network by gaining unauthorized access to the IPC$ share on network resources on the network on which it is operating.</p><h3>Impact</h3><p>Ransomware not only targets home users; businesses can also become infected with ransomware, leading to negative consequences, including</p><ul><li>temporary or permanent loss of sensitive or proprietary information,</li><li>disruption to regular operations,</li><li>financial losses incurred to restore systems and files, and</li><li>potential harm to an organization’s reputation.</li></ul><p>Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.</p><h3>Solution</h3><p><strong><u>Recommended Steps for Prevention </u></strong></p><ul><li>Apply the Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017.</li><li style="margin-left: 0.5in;">Enable strong spam filters to prevent phishing e-mails from reaching the end users and authenticate in-bound e-mail using technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent e-mail spoofing. </li><li style="margin-left: 0.5in;">Scan all incoming and outgoing e-mails to detect threats and filter executable files from reaching the end users.</li><li style="margin-left: 0.5in;">Ensure anti-virus and anti-malware solutions are set to automatically conduct regular scans.</li><li style="margin-left: 0.5in;">Manage the use of privileged accounts. Implement the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary. </li><li style="margin-left: 0.5in;">Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares. </li><li style="margin-left: 0.5in;">Disable macro scripts from Microsoft Office files transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files transmitted via e-mail instead of full Office suite applications.</li><li>Develop, institute and practice employee education programs for identifying scams, malicious links, and attempted social engineering.</li></ul><ul><li>Have regular penetration tests run against the network. No less than once a year. Ideally, as often as possible/practical.</li><li>Test your backups to ensure they work correctly upon use.</li></ul><p><strong><u>Recommended Steps for Remediation</u></strong></p><ul><li>Contact law enforcement. We strongly encourage you to contact a local FBI field office upon discovery to report an intrusion and request assistance. Maintain and provide relevant logs.</li><li>Implement your security incident response and business continuity plan. Ideally, organizations should ensure they have appropriate backups so their response is simply to restore the data from a known clean backup. </li></ul><p><strong><u>Defending Against Ransomware Generally</u></strong></p><p>Precautionary measures to mitigate ransomware threats include:</p><ul><li>Ensure anti-virus software is up-to-date.</li><li>Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.</li><li>Scrutinize links contained in e-mails, and do not open attachments included in unsolicited e-mails.</li><li>Only download software – especially free software – from sites you know and trust.</li><li>Enable automated patches for your operating system and Web browser.</li></ul><p><strong><u>Report Notice</u></strong></p><p>DHS and FBI encourages recipients who identify the use of tool(s) or techniques discussed in this document to report information to DHS or law enforcement immediately. We encourage you to contact DHS’s National Cybersecurity and Communications Integration Center (NCCIC) (<a href="https://www.us-cert.govmailto:NCCICCustomerService@hq.dhs.gov">NCCICcustomerservice@hq.dhs.gov</a> or 888-282-0870), or the FBI through a local field office or the FBI’s Cyber Division (<a href="https://www.us-cert.govmailto:CyWatch@ic.fbi.gov">CyWatch@ic.fbi.gov </a>or 855-292-3937) to report an intrusion and to request incident response resources or technical assistance.</p><h3>References</h3><ul><li><a href="https://blog.malwarebytes.com/cybercrime/2017/05/wanacrypt0r-ransomware-hits-it-big-just-before-the-weekend/">Malwarebytes LABS: "WanaCrypt0r ransomware hits it big just before the weekend </a></li><li><a href="https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/">Malwarebytes LABS: "The worm that spreads WanaCrypt0r" </a></li><li><a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">Microsoft: "Microsoft Security Bulletin MS17-010"</a></li><li><a href="https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/#4fb6a207e599">Forbes: "An NSA Cyber Weapon Might Be Behind A Massive Global Ransomware Outbreak"</a></li><li><a href="http://www.reuters.com/article/us-britain-security-hospitals-ransomware-idUSKBN1882O2">Reuters: "Factbox: Don't click - What is the 'ransomware' WannaCry worm?"</a></li><li><a href="https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168">GitHubGist: "WannaCry|WannaDecrypt0r NSA-Cybereweapon-Powered Ransomware Worm"</a></li><li><a href="http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598">Microsoft: “Microsoft Update Catalog: Patches for Windows XP, Windows 8, and Windows Server 2003”, (KB4012598)</a></li></ul><h3>Revision History</h3><ul><li>May 12, 2017: Initial post</li><li>May 14, 2017: Corrected Syntax in the second Yara Rule</li><li>May 14, 2017: Added Microsoft link to patches for Windows XP, Windows 8, and Windows Server 2003</li><li>May 14, 2017: Corrected Syntax in the first Yara Rule</li></ul><hr><p>This product is provided subject to this <a href="http://www.us-cert.gov/privacy/notification">Notification</a> and this <a href="http://www.us-cert.gov/privacy/">Privacy & Use</a> policy.</p></div></div><div id="ox-e35719d818-mail_footer"><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%" height="60">A copy of this publication is available at <a href="https://www.us-cert.gov">www.us-cert.gov</a>. If you need help or have questions, please send an email to <a href="mailto:info@us-cert.gov">info@us-cert.gov</a>. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book.</td></tr></tbody></table><table style="border-collapse: collapse; width: 400px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="bottom" height="24">OTHER RESOURCES:</td></tr><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="middle" height="24"><a href="http://www.us-cert.gov/contact-us/" target="_blank">Contact Us</a> | <a href="http://www.us-cert.gov/security-publications" target="_blank">Security Publications</a> | <a href="http://www.us-cert.gov/ncas" target="_blank">Alerts and Tips</a> | <a href="http://www.us-cert.gov/related-resources" target="_blank">Related Resources</a></td></tr></tbody></table><table style="border-collapse: collapse; width: 150px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" colspan="7" valign="bottom" height="24">STAY CONNECTED:</td></tr><tr><td width="41" style="padding: 0px;"><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/SOCIAL_MEDIA/envelope.gif" border="0" alt="Sign up for email updates" width="25" height="25" style="width: 25px; height: 25px;"></a></td></tr></tbody></table><p style="color: #666666; font-family: Arial, sans-serif; font-size: 12px;">SUBSCRIBER SERVICES:<br><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true" target="_blank">Manage Preferences</a> | <a href="https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.b03cc84c90ac58ffb6e970add416fb2d&destination=w3hwn%40arrl.net" target="_blank">Unsubscribe</a> | <a href="https://subscriberhelp.govdelivery.com/">Help</a></p></div><div id="ox-e35719d818-tagline"><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%">This email was sent to w3hwn@arrl.net using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870</td><td align="right" width="11%" style="padding: 0px;"><a href="http://www.govdelivery.com/portals/powered-by" target="_blank"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/logo_gd_poweredby.gif" border="0" alt="Powered by GovDelivery" width="115" height="35" style="width: 115px; height: 35px;"></a></td></tr></tbody></table></div></td></tr></tbody></table></blockquote></body></html>