SlideShare a Scribd company logo
1 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
1 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Petya/NotPetya
Report on Malware Infection
12 / 6 / 2018
Team NotPetya WalterWhite Laboratories Dec. 2018
2 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
TOC / Introduction
This document is designed to summarize our analysis of NotPetya and offer forward thinking
solutions to counter similar attacks in the future.
This document will cover the following areas:
● Executive Summary
● Characteristics
● Static Analysis
○ Synopsis of Executable
○ Other Key Points
○ Timeline
○ Initial Behavior
● Dynamic Analysis
○ Process Environment
○ Network Activity
○ Filesystem Modifications
● Containment Strategy
○ Scope
○ Severity
○ Solution
● Awareness Training
○ Identification
○ Quarantine and Response
○ Escalation
● Summary
Team NotPetya WalterWhite Laboratories Dec. 2018
3 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
/EXECUTIVE SUMMARY
SEVERITY VICTIMS ATTACKERS
HIGH worldwide – companies Unknown
A new malware variant – called Petya/NotPetya – started to disabled several
critical systems on Tuesday, 27th of June 2017 in Ukraine, Russia, Denmark, France,
the UK, the USA, Belgium and multiple other countries. While originally thought to be a
ransomware-only malware, after technical analysis it became clear that it had more
functionality than standard ransomware with more intent on destruction of data. While
this string of malware does encrypt files, it also inflicts unrepairable damage to the
system and was built in a way that decryption would not be possible.
Multiple sources , including the US government’s Homeland Security, state that
NotPetya’s primary goal was destruction of both data and data systems. The malware
spreads through a well-known vulnerability in the Windows SMB-protocol, combined
with the usage of internal Windows toolkits (WMIC, PsExec) and the theft of credentials.
Once infected the computer will no longer boot and the vast majority of all files on the
drive have been encrypted. Upon attempted startup of the system the user will be
presented with a message on the screen informing the user that the systems’ files are
encrypted and cannot be decrypted unless a decryption key is purchased for $300.
Upon payment of the $300 ransom, the malware writer claims that the decryption key
will be sent. It is believed that the initial infection involves the automatic update of the
accounting software ‘MEDoc’, a company based in the Ukraine. The update was
contaminated with the malware Petya/NotPetya and spread quickly throughout several
networks of the Ukrainian government and the logistics company Maersk.
Team NotPetya WalterWhite Laboratories Dec. 2018
4 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Screen grab of the ransom note.
The malware spread through the internal networks of Maersk, which is an international
company and thus was able to begin to cross country’s borders. The malware was
spreading using the same vulnerabilities in the SMB-protocol which were also used in
the WannaCry campaign. Companies that had not patched these vulnerabilities were
vulnerable. In addition, the Petya/NotPetya malware contains several other methods –
including the theft of credentials – to infect systems internally other than just the SMB-
vulnerability, which means that only patching is not sufficient.
Along with Walter White Laboratories, other companies that were infected and had
substantial financial loss were FedEx, Merck, WPP, DLA Piper, Nuance
Communications, Beirsdorf, Maersk, Saint Gobain as well as many other smaller
companies.
Team NotPetya WalterWhite Laboratories Dec. 2018
5 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
TECHNICAL OVERVIEW
Characteristics
This particular string of malware closely resembles the Petya malware of 2016, but has some
distinctive differences:
● The infection vector does not involve phishing, but the MEDoc application;
● The distribution methods are the SMB-vulnerabilities, legitimate Windows tools and
Mimikatz;
● Fake digitally signed software is used; o XOR encrypted shell code is used in malware
load to bypass AV signatures;
● A specific behavior can be observed on domain controllers and servers; this malware
attempts to activate a function ‘DhcpEnumSubnets ()' to retrieve all DHCP subnet before
a scan is made to tcp / 139 and tcp / 445 services;
● There is an unconfirmed ‘killswitch’ in the malware that can be activated by creating an
'read only file called 'perfc' under the % Windows% install folder. However, this will not
prevent malware from spreading itself;
● There is no evidence for communication to an external communication and control
server.
Static Analysis
Synopsis of Executable
Although initially labeled as ransomware due to the ransom message that is displayed after
infection, it appears now that NotPetya functions more as a destructive wiper-like tool than
actual ransomware.
Initially, analysis showed many similarities with Petya ransomware samples from 2016, but
further research indicated the malware had been modified to cause data destruction. NotPetya
overwrites sectors of the physical hard drive and C: volume, but does not contain the ability to
restore the files, rendering recovery impossible even if the ransom is paid.
Using the Windows API DeviceIoControl, the malware is able to obtain direct read and write
access to the physical hard drive, without interaction with the operating system (provided it has
the proper administrative permissions).
This allows the code to determine the number of disks and partitions on the system, unmount a
Team NotPetya WalterWhite Laboratories Dec. 2018
6 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
mounted volume (even if in use), and determine the drive geometry for the drives on the system
(i.e., the number of sectors, bytes per sector, etc.). The malware uses this access to destroy
data critical to the operating system. NotPetya also has the ability to replace the OS bootloader
with custom code embedded in the binary.
Other Key Points
● NotPetya is a 27kb malware DLL (dynamic-link library) that is launched using
rundll32.exe
● PE32 executable (DLL) (console) Intel 80386, for MS Windows
● Compilation date: Tuesday, 27th of June 2017
Timeline
● June 27, 2017 - 05:00 - 06:00 EDT - First signs of attack emerge on Twitter in a post
about a Ukrainian power distributor being hacked
● June 27, 2017 - 08:00 EDT - Symantec confirms that Petya is responsible for the attack
● June 27, 2017 - 10:00 EDT - Kaspersky Lab tweets a statement clarifying that the
ransomware is not a variant of Petya but is a new ransomware named NotPetya. They
also announce that at least 2000 organization had already been infected at the time of
the tweet.
● June 27, 2017 - 12:00 EDT - Ukraine police announce that MeDoc, and accounting
software used by many Ukrainians to pay their taxes was the NotPetya vector point.
● June 27, 2017 - 13:00 EDT - Security officials begin to announce methods to avoid the
attack.
● June 28, 2017 - 05:00 EDT - It is announced that those who decided to pay the ransom
are not getting their files back.
Team NotPetya WalterWhite Laboratories Dec. 2018
7 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Initial Behavior
The table below summarizes the initial activity generated by the sample upon upload to
Any.Run.
Behavior Once Active
Once installed, NotPetya does several things:
● It runs Mischa, a component of an earlier variant of the Petya ransomware, and encrypts
individual files
● It reboots the system and encrypts the MFT (master file table) and renders the Master
Boot Record (MBR) inoperable. It also overwrites the MBR with a file that displays the
ransom note, which renders the system unable to boot.
Activity Type Count
HTTP Requests N/A
DNS Requests N/A
Connections RAW UDPdata
Files Changed MBR
Dynamic Analysis
The test results were generated by executing the malware on Any.Run’s hosted platform.
What is EternalBlue? The EternalBlue vulnerability, CVE-2017-0144, targets the Microsoft
Windows Server Message Block (SMB) protocol and allows attackers to execute arbitrary code.
A fix was issued in March 2017 by Microsoft.
Process Environment
The malware runs as admin, after successfully getting admin access to the machine the
malware then encrypts the master boot record making the infected windows computers
unusable. NotPetya having admin privileges allows it to harvest user credentials from the
infected host then uses those credentials to connect to other systems on the network, spreading
the malware like a worm. Only takes one infected machine in an organization to take down all
systems in the network.
Team NotPetya WalterWhite Laboratories Dec. 2018
8 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
NotPetya executable/loader fingerprints
● MD5: 71b6a493388e7d0b40c83ce903bc6b04
● SHA1: 34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d
● SHA256:
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
Indicators of suspicious activity: The malware first shows signs of suspicious activity when it
decompresses its resource named 0x3 of type RT_RCDATA contents to
C:Windowsdllhost.dat. Analysis of dllhost.dat shows that it is a copy of the PsExec utility,
which is a telnet replacement that allows execution of process on other systems on the LAN.
Then it forces the computer to reboot.
Network Activity
While monitoring the network traffic after running NotPetya executable, The malware
does not make any DNS requests or HTTP requests. Instead it creates a RAW UDP data flow tp
192.168.100.140 (attackers CNC) from our localhost (VM) established on port:137
The malware enumerates all network adapters, all known server names via NetBIOS and also
retrieves the list of current DHCP leases, if available. Each and every IP on the local network
and each server found is checked for open TCP ports 445 and 139. Those machines that have
these ports open are then attacked with one of the methods described above.
After initial infection, the malware tries to move laterally by using following techniques:
● The theft of username / password combinations using a variant of Mimikatz;
● The reuse of active SMB sessions;
● The usage of shared folders to spread the ransomware through the network using WMIC
and PsExec;
● The usage of the known SMBv1 vulnerabilities EternalBlue and EternalRomance2.
A network scan is made:
Team NotPetya WalterWhite Laboratories Dec. 2018
9 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
● The malware enumerates all network adapters and all possible server names via
NetBIOS;
● Enumerates the DHCP addresses used, if available;
● Also uses the local ARP cache;
● Each network address on the local network is checked for open TCP ports, specifically
SMB ports 445 and 139. Machines that have these ports open are then attacked using
one of the methods described above.
Team NotPetya WalterWhite Laboratories Dec. 2018
10 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Filesystem Modifications
Based on the information from the Any.run report, the rundll32.exe executes commands
and overwrites the data. The file system modifications are the changes to be performed by a
generated package during its deployment to the file system on a target PC. Those changes can
include files and folders creation or deletion, file content modification and shortcuts creation. In
the case of NotPetya, rundll32.exe looks normal but the malware is disguised as a normal
Windows application and then “encrypts” the data to hold it for “ransom.” Once the user reboots
the computer or the system goes black, the information is pretty much gone.
Containment Strategy
Scope
The malware aims to obtain user credentials via Mimikatz tools and once it obtains
administrative credentials, it will start to spread itself. It can jump to other devices that are
vulnerable and instead of holding people’s information and data like ransomware, it would wipe
the information, thus users would lose money and wouldn’t get anything back. The malware
specifically targeted Windows computers in June 2017 in the following countries: Ukraine,
Russia, Denmark, France, the UK, the USA, Belgium and others, dubbing it the “worst
cybersecurity attack in history”. These Window computers did not have software updates and
did not have the latest patches, thus making them vulnerable to the attack and showing how the
we are universally not up to standard. Computers that ran Windows 10 were not as affected and
even if they were, the improved security measures prevented the malware from spreading to
other systems. The majority of affected operating systems were anything older than that.
Companies ranging from 10k employees to even 10-50 employees were affected by this attack
and no specific industry was targeted - anyone who was vulnerable with an older Windows OS
was a target.
Severity
In a report created by the White House it was estimated that the damage from NotPetya
was more than 10 billion dollars. Pharmaceutical vendor Merck lost around 670 million dollars
and FedEx lost around 450 million dollars. Consumer Products vendor Reckitt Benckiser lost
around 100 million dollars and snack maker Mondelez International had loses exceeding 150
million dollars. Merck also had to replace 45000 computers that were infected with the virus.
Team NotPetya WalterWhite Laboratories Dec. 2018
11 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Other companies around the world that lost large amounts of money due to NotPetya are:
Nuance Communications, Beirsdorf, Maersk, Saint Gobain, as well as many other smaller
companies that lost less but were equally as devastating if not more so because of their size
and limited resources. Tom Bossert, the current head of Homeland Security at the time of the
discovery of NotPetya confirmed the estimates of the damage and the potential source. It is
believed that the the Russian government, in an attempt to destabilize the Ukraine, unleashed
the ransomware on the unsuspecting global network and the unforeseen consequences were
devastating worldwide.
In the end it is far cheaper to just replace infected computers than it is to run the risk of infection
again.
Solution
First and foremost the best solution is a backup strategy that follows the 3-2-1 backup
rules. There should be at least 3 copies of all data. Two copies are on different media types.
This can be hard drive, tape backup, or any other medium that is stored off the network. Keep at
least one copy stored off-site in the event of physical data loss in the location the other copies
reside. Maintaining a backup schedule that limits the amount of data lost between backups. For
example, should the backups run continuously on one media and then a full backup at midnight.
Below is a list of other steps that can be taken to help mitigate the potential of attack.
● Don’t pay the ransom because it’s too late! Once the attack commences, the user’s
information is wiped from the infected system. In previous versions of “similar”
ransomware, the installation ID contained crucial information for the key recovery.
NotPetya’s ID is randomly generated, and the single email listed on the ransom screen
was quickly killed.
● Ensure your system is patched according to the latest security updates. (Specifically,
Microsoft Security Patch MS17-010). Windows 10 contains security measures that can
prevent other systems from being infected.
● Take away any local administrator rights of regular users.
● Watch out for the creation of new scheduled tasks via EventId 106 for the following
tasks:
○ ‘schtasks /Create /SC once /TN “” /TR “shutdown.exe /r /f” /ST ’
○ ‘cmd.exe /c schtasks /RU “SYSTEM” /Create /SC once /TN “” /TR’
○ ‘C:Windowssystem32shutdown.exe /r /f” /ST ’.
Team NotPetya WalterWhite Laboratories Dec. 2018
12 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
● Block the execution of ‘PsExec’ and ‘perfc.dat’ files through Applocker or a similar tool.
Make sure your AV / IDS / IPS rule set is up-to-date.
● Enforce a backup strategy and test it.
● Comply with the traditional security methods against Ransomware.
● Consider following SMB restrictions.
● Ensure that Windows SMB services (typically TCP port 445) are not directly connected
to the internet.
● Consider blocking entering external traffic on port 445.
● Consider disabling SMBv1 in your network.
● Monitor the internal network specifically on anomalies in management traffic.
Awareness Training
Identification
Once infected it is too late. Hopefully you will have a solid backup plan in place. If you are lucky
enough to be warned before the malware takes over, look for the following:
● Rundll32.exe running in the Windows Task Manager
● System shutdown for reboot on it’s own
If the system shuts down and begins the reboot process, the MBR (Master Boot Record) has
been encrypted and the fake disk repair screen will appear showing the progress of the local
disk files being encrypted. Following completion of the encryption, you will be presented with a
black screen filled with red text demanding money.
Escalation
A single infected system on the network possessing administrative credentials is capable
of spreading this infection to all the other computers through WMI or PSEXEC.
If any indication of the malware is discovered, the computer must be immediately shut off and
not rebooted. The security team must be contacted immediately and steps can be taken to
protect the remaining systems on the network as the malware will have already made attempts
to propagate.
After notifying the IT/Security team right away, you should next contact your direct manager
right away! Your direct manager will most likely inform the Corporate Management team to
make them aware of what be a potentially major issue.
Team NotPetya WalterWhite Laboratories Dec. 2018
13 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Organize a meeting with officers to decide on the cost benefit analysis of keeping the drives in
the event a decryption method is found in the future. The encrypted drives will need to be
labeled and stored for a potential decryption in the event flaws in the malware code are
expanded. If proper backups are available, the drives can be overwritten to save labor, storage
and cost of new hardware.
Quarantine and Response
If the extra rundll32.exe file is present as mentioned above in the Identification section; power
off the PC and do not turn it back on again. It was found that it may be possible to stop the
encryption process if an infected computer is immediately shut down when the fictitious chkdsk
screen appears, and a security analyst proposed that creating read-only files named perf.c
and/or perfc.dat in the Windows installation directory could prevent the payload of the current
strain from executing.
Remove the computer from the internal network and isolate it so that infection to other machines
is not possible. While the most secure method to remove NotPetya is to replace the hard drive
and reinstall from a backup, reinstalling Windows will remove NotPetya from the system. This
again is assuming the malware has not evolved into a new variant that stores its executables
outside of the typical Windows install. In the event that the encryption has begun, the computer
must still be powered off, as this will halt the process and leave the unaffected data available for
retrieval. If this is the case the hard drive must be replaced as it is no longer able to be used
safely.
For NotPetya, the ID shown in the ransom screen is random data and therefore even payment
to the threat actor will not resolve the attack. If AI engines are available, the security team will
be able to update the rules to successfully detect elements of the infection and propagation.
In addition to the above, a robust anti-malware suite with embedded anti-ransomware protection
should be part of all of the systems, including any remote systems or laptops used by the sales
team in the field.
Update Microsoft Windows and all third party software. Ensure comprehensive cybersecurity
training for all personnel that perform any work on the computers within the company. This
training should include how to identify phishing emails, social data gathering, and instructions on
routine backup techniques with an emphasis on data validation.
Team NotPetya WalterWhite Laboratories Dec. 2018
14 of 14
Team NotPetya WalterWhite Laboratories Dec. 2018
Summary
NotPetya represents the evolution of cybersecurity attacks not just in terms of the
methodology used, but in the intent. NotPetya combines ransomware with the ability to
propagate itself across a network. Built upon a relatively unsuccessful ransomware (Petya), the
malware binary tries to extract logins and passwords of users with the effort of lateral movement
through a local network if administrative credentials are gained.
The second function of NotPetya is to make irreversible modifications to the Master Boot
Record and then force a reboot of the system at which point a disk repair message is displayed.
This disk repair is in reality, the attack of the fixed drives on the system, encrypting all the files.

More Related Content

What's hot

Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...CloudVillage
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...North Texas Chapter of the ISSA
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesPriyanka Aash
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereouslySirris
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageErik Van Buggenhout
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SHRIYARAI4
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case StudyAmr Thabet
 

What's hot (20)

Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...
NTXISSACSC2 - Advanced Persistent Threat (APT) Life Cycle Management Monty Mc...
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven Methodologies
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 

Similar to Full report final for NotPetya

BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsKaspersky
 
RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014EMC
 
Malware freak show
Malware freak showMalware freak show
Malware freak showsr1nu
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackEMC
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Andrey Apuhtin
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 

Similar to Full report final for NotPetya (20)

BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
Pentesting with linux
Pentesting with linuxPentesting with linux
Pentesting with linux
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

Full report final for NotPetya

  • 1. Team NotPetya WalterWhite Laboratories Dec. 2018 1 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Petya/NotPetya Report on Malware Infection 12 / 6 / 2018
  • 2. Team NotPetya WalterWhite Laboratories Dec. 2018 2 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 TOC / Introduction This document is designed to summarize our analysis of NotPetya and offer forward thinking solutions to counter similar attacks in the future. This document will cover the following areas: ● Executive Summary ● Characteristics ● Static Analysis ○ Synopsis of Executable ○ Other Key Points ○ Timeline ○ Initial Behavior ● Dynamic Analysis ○ Process Environment ○ Network Activity ○ Filesystem Modifications ● Containment Strategy ○ Scope ○ Severity ○ Solution ● Awareness Training ○ Identification ○ Quarantine and Response ○ Escalation ● Summary
  • 3. Team NotPetya WalterWhite Laboratories Dec. 2018 3 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 /EXECUTIVE SUMMARY SEVERITY VICTIMS ATTACKERS HIGH worldwide – companies Unknown A new malware variant – called Petya/NotPetya – started to disabled several critical systems on Tuesday, 27th of June 2017 in Ukraine, Russia, Denmark, France, the UK, the USA, Belgium and multiple other countries. While originally thought to be a ransomware-only malware, after technical analysis it became clear that it had more functionality than standard ransomware with more intent on destruction of data. While this string of malware does encrypt files, it also inflicts unrepairable damage to the system and was built in a way that decryption would not be possible. Multiple sources , including the US government’s Homeland Security, state that NotPetya’s primary goal was destruction of both data and data systems. The malware spreads through a well-known vulnerability in the Windows SMB-protocol, combined with the usage of internal Windows toolkits (WMIC, PsExec) and the theft of credentials. Once infected the computer will no longer boot and the vast majority of all files on the drive have been encrypted. Upon attempted startup of the system the user will be presented with a message on the screen informing the user that the systems’ files are encrypted and cannot be decrypted unless a decryption key is purchased for $300. Upon payment of the $300 ransom, the malware writer claims that the decryption key will be sent. It is believed that the initial infection involves the automatic update of the accounting software ‘MEDoc’, a company based in the Ukraine. The update was contaminated with the malware Petya/NotPetya and spread quickly throughout several networks of the Ukrainian government and the logistics company Maersk.
  • 4. Team NotPetya WalterWhite Laboratories Dec. 2018 4 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Screen grab of the ransom note. The malware spread through the internal networks of Maersk, which is an international company and thus was able to begin to cross country’s borders. The malware was spreading using the same vulnerabilities in the SMB-protocol which were also used in the WannaCry campaign. Companies that had not patched these vulnerabilities were vulnerable. In addition, the Petya/NotPetya malware contains several other methods – including the theft of credentials – to infect systems internally other than just the SMB- vulnerability, which means that only patching is not sufficient. Along with Walter White Laboratories, other companies that were infected and had substantial financial loss were FedEx, Merck, WPP, DLA Piper, Nuance Communications, Beirsdorf, Maersk, Saint Gobain as well as many other smaller companies.
  • 5. Team NotPetya WalterWhite Laboratories Dec. 2018 5 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 TECHNICAL OVERVIEW Characteristics This particular string of malware closely resembles the Petya malware of 2016, but has some distinctive differences: ● The infection vector does not involve phishing, but the MEDoc application; ● The distribution methods are the SMB-vulnerabilities, legitimate Windows tools and Mimikatz; ● Fake digitally signed software is used; o XOR encrypted shell code is used in malware load to bypass AV signatures; ● A specific behavior can be observed on domain controllers and servers; this malware attempts to activate a function ‘DhcpEnumSubnets ()' to retrieve all DHCP subnet before a scan is made to tcp / 139 and tcp / 445 services; ● There is an unconfirmed ‘killswitch’ in the malware that can be activated by creating an 'read only file called 'perfc' under the % Windows% install folder. However, this will not prevent malware from spreading itself; ● There is no evidence for communication to an external communication and control server. Static Analysis Synopsis of Executable Although initially labeled as ransomware due to the ransom message that is displayed after infection, it appears now that NotPetya functions more as a destructive wiper-like tool than actual ransomware. Initially, analysis showed many similarities with Petya ransomware samples from 2016, but further research indicated the malware had been modified to cause data destruction. NotPetya overwrites sectors of the physical hard drive and C: volume, but does not contain the ability to restore the files, rendering recovery impossible even if the ransom is paid. Using the Windows API DeviceIoControl, the malware is able to obtain direct read and write access to the physical hard drive, without interaction with the operating system (provided it has the proper administrative permissions). This allows the code to determine the number of disks and partitions on the system, unmount a
  • 6. Team NotPetya WalterWhite Laboratories Dec. 2018 6 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 mounted volume (even if in use), and determine the drive geometry for the drives on the system (i.e., the number of sectors, bytes per sector, etc.). The malware uses this access to destroy data critical to the operating system. NotPetya also has the ability to replace the OS bootloader with custom code embedded in the binary. Other Key Points ● NotPetya is a 27kb malware DLL (dynamic-link library) that is launched using rundll32.exe ● PE32 executable (DLL) (console) Intel 80386, for MS Windows ● Compilation date: Tuesday, 27th of June 2017 Timeline ● June 27, 2017 - 05:00 - 06:00 EDT - First signs of attack emerge on Twitter in a post about a Ukrainian power distributor being hacked ● June 27, 2017 - 08:00 EDT - Symantec confirms that Petya is responsible for the attack ● June 27, 2017 - 10:00 EDT - Kaspersky Lab tweets a statement clarifying that the ransomware is not a variant of Petya but is a new ransomware named NotPetya. They also announce that at least 2000 organization had already been infected at the time of the tweet. ● June 27, 2017 - 12:00 EDT - Ukraine police announce that MeDoc, and accounting software used by many Ukrainians to pay their taxes was the NotPetya vector point. ● June 27, 2017 - 13:00 EDT - Security officials begin to announce methods to avoid the attack. ● June 28, 2017 - 05:00 EDT - It is announced that those who decided to pay the ransom are not getting their files back.
  • 7. Team NotPetya WalterWhite Laboratories Dec. 2018 7 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Initial Behavior The table below summarizes the initial activity generated by the sample upon upload to Any.Run. Behavior Once Active Once installed, NotPetya does several things: ● It runs Mischa, a component of an earlier variant of the Petya ransomware, and encrypts individual files ● It reboots the system and encrypts the MFT (master file table) and renders the Master Boot Record (MBR) inoperable. It also overwrites the MBR with a file that displays the ransom note, which renders the system unable to boot. Activity Type Count HTTP Requests N/A DNS Requests N/A Connections RAW UDPdata Files Changed MBR Dynamic Analysis The test results were generated by executing the malware on Any.Run’s hosted platform. What is EternalBlue? The EternalBlue vulnerability, CVE-2017-0144, targets the Microsoft Windows Server Message Block (SMB) protocol and allows attackers to execute arbitrary code. A fix was issued in March 2017 by Microsoft. Process Environment The malware runs as admin, after successfully getting admin access to the machine the malware then encrypts the master boot record making the infected windows computers unusable. NotPetya having admin privileges allows it to harvest user credentials from the infected host then uses those credentials to connect to other systems on the network, spreading the malware like a worm. Only takes one infected machine in an organization to take down all systems in the network.
  • 8. Team NotPetya WalterWhite Laboratories Dec. 2018 8 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 NotPetya executable/loader fingerprints ● MD5: 71b6a493388e7d0b40c83ce903bc6b04 ● SHA1: 34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d ● SHA256: 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745 Indicators of suspicious activity: The malware first shows signs of suspicious activity when it decompresses its resource named 0x3 of type RT_RCDATA contents to C:Windowsdllhost.dat. Analysis of dllhost.dat shows that it is a copy of the PsExec utility, which is a telnet replacement that allows execution of process on other systems on the LAN. Then it forces the computer to reboot. Network Activity While monitoring the network traffic after running NotPetya executable, The malware does not make any DNS requests or HTTP requests. Instead it creates a RAW UDP data flow tp 192.168.100.140 (attackers CNC) from our localhost (VM) established on port:137 The malware enumerates all network adapters, all known server names via NetBIOS and also retrieves the list of current DHCP leases, if available. Each and every IP on the local network and each server found is checked for open TCP ports 445 and 139. Those machines that have these ports open are then attacked with one of the methods described above. After initial infection, the malware tries to move laterally by using following techniques: ● The theft of username / password combinations using a variant of Mimikatz; ● The reuse of active SMB sessions; ● The usage of shared folders to spread the ransomware through the network using WMIC and PsExec; ● The usage of the known SMBv1 vulnerabilities EternalBlue and EternalRomance2. A network scan is made:
  • 9. Team NotPetya WalterWhite Laboratories Dec. 2018 9 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 ● The malware enumerates all network adapters and all possible server names via NetBIOS; ● Enumerates the DHCP addresses used, if available; ● Also uses the local ARP cache; ● Each network address on the local network is checked for open TCP ports, specifically SMB ports 445 and 139. Machines that have these ports open are then attacked using one of the methods described above.
  • 10. Team NotPetya WalterWhite Laboratories Dec. 2018 10 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Filesystem Modifications Based on the information from the Any.run report, the rundll32.exe executes commands and overwrites the data. The file system modifications are the changes to be performed by a generated package during its deployment to the file system on a target PC. Those changes can include files and folders creation or deletion, file content modification and shortcuts creation. In the case of NotPetya, rundll32.exe looks normal but the malware is disguised as a normal Windows application and then “encrypts” the data to hold it for “ransom.” Once the user reboots the computer or the system goes black, the information is pretty much gone. Containment Strategy Scope The malware aims to obtain user credentials via Mimikatz tools and once it obtains administrative credentials, it will start to spread itself. It can jump to other devices that are vulnerable and instead of holding people’s information and data like ransomware, it would wipe the information, thus users would lose money and wouldn’t get anything back. The malware specifically targeted Windows computers in June 2017 in the following countries: Ukraine, Russia, Denmark, France, the UK, the USA, Belgium and others, dubbing it the “worst cybersecurity attack in history”. These Window computers did not have software updates and did not have the latest patches, thus making them vulnerable to the attack and showing how the we are universally not up to standard. Computers that ran Windows 10 were not as affected and even if they were, the improved security measures prevented the malware from spreading to other systems. The majority of affected operating systems were anything older than that. Companies ranging from 10k employees to even 10-50 employees were affected by this attack and no specific industry was targeted - anyone who was vulnerable with an older Windows OS was a target. Severity In a report created by the White House it was estimated that the damage from NotPetya was more than 10 billion dollars. Pharmaceutical vendor Merck lost around 670 million dollars and FedEx lost around 450 million dollars. Consumer Products vendor Reckitt Benckiser lost around 100 million dollars and snack maker Mondelez International had loses exceeding 150 million dollars. Merck also had to replace 45000 computers that were infected with the virus.
  • 11. Team NotPetya WalterWhite Laboratories Dec. 2018 11 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Other companies around the world that lost large amounts of money due to NotPetya are: Nuance Communications, Beirsdorf, Maersk, Saint Gobain, as well as many other smaller companies that lost less but were equally as devastating if not more so because of their size and limited resources. Tom Bossert, the current head of Homeland Security at the time of the discovery of NotPetya confirmed the estimates of the damage and the potential source. It is believed that the the Russian government, in an attempt to destabilize the Ukraine, unleashed the ransomware on the unsuspecting global network and the unforeseen consequences were devastating worldwide. In the end it is far cheaper to just replace infected computers than it is to run the risk of infection again. Solution First and foremost the best solution is a backup strategy that follows the 3-2-1 backup rules. There should be at least 3 copies of all data. Two copies are on different media types. This can be hard drive, tape backup, or any other medium that is stored off the network. Keep at least one copy stored off-site in the event of physical data loss in the location the other copies reside. Maintaining a backup schedule that limits the amount of data lost between backups. For example, should the backups run continuously on one media and then a full backup at midnight. Below is a list of other steps that can be taken to help mitigate the potential of attack. ● Don’t pay the ransom because it’s too late! Once the attack commences, the user’s information is wiped from the infected system. In previous versions of “similar” ransomware, the installation ID contained crucial information for the key recovery. NotPetya’s ID is randomly generated, and the single email listed on the ransom screen was quickly killed. ● Ensure your system is patched according to the latest security updates. (Specifically, Microsoft Security Patch MS17-010). Windows 10 contains security measures that can prevent other systems from being infected. ● Take away any local administrator rights of regular users. ● Watch out for the creation of new scheduled tasks via EventId 106 for the following tasks: ○ ‘schtasks /Create /SC once /TN “” /TR “shutdown.exe /r /f” /ST ’ ○ ‘cmd.exe /c schtasks /RU “SYSTEM” /Create /SC once /TN “” /TR’ ○ ‘C:Windowssystem32shutdown.exe /r /f” /ST ’.
  • 12. Team NotPetya WalterWhite Laboratories Dec. 2018 12 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 ● Block the execution of ‘PsExec’ and ‘perfc.dat’ files through Applocker or a similar tool. Make sure your AV / IDS / IPS rule set is up-to-date. ● Enforce a backup strategy and test it. ● Comply with the traditional security methods against Ransomware. ● Consider following SMB restrictions. ● Ensure that Windows SMB services (typically TCP port 445) are not directly connected to the internet. ● Consider blocking entering external traffic on port 445. ● Consider disabling SMBv1 in your network. ● Monitor the internal network specifically on anomalies in management traffic. Awareness Training Identification Once infected it is too late. Hopefully you will have a solid backup plan in place. If you are lucky enough to be warned before the malware takes over, look for the following: ● Rundll32.exe running in the Windows Task Manager ● System shutdown for reboot on it’s own If the system shuts down and begins the reboot process, the MBR (Master Boot Record) has been encrypted and the fake disk repair screen will appear showing the progress of the local disk files being encrypted. Following completion of the encryption, you will be presented with a black screen filled with red text demanding money. Escalation A single infected system on the network possessing administrative credentials is capable of spreading this infection to all the other computers through WMI or PSEXEC. If any indication of the malware is discovered, the computer must be immediately shut off and not rebooted. The security team must be contacted immediately and steps can be taken to protect the remaining systems on the network as the malware will have already made attempts to propagate. After notifying the IT/Security team right away, you should next contact your direct manager right away! Your direct manager will most likely inform the Corporate Management team to make them aware of what be a potentially major issue.
  • 13. Team NotPetya WalterWhite Laboratories Dec. 2018 13 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Organize a meeting with officers to decide on the cost benefit analysis of keeping the drives in the event a decryption method is found in the future. The encrypted drives will need to be labeled and stored for a potential decryption in the event flaws in the malware code are expanded. If proper backups are available, the drives can be overwritten to save labor, storage and cost of new hardware. Quarantine and Response If the extra rundll32.exe file is present as mentioned above in the Identification section; power off the PC and do not turn it back on again. It was found that it may be possible to stop the encryption process if an infected computer is immediately shut down when the fictitious chkdsk screen appears, and a security analyst proposed that creating read-only files named perf.c and/or perfc.dat in the Windows installation directory could prevent the payload of the current strain from executing. Remove the computer from the internal network and isolate it so that infection to other machines is not possible. While the most secure method to remove NotPetya is to replace the hard drive and reinstall from a backup, reinstalling Windows will remove NotPetya from the system. This again is assuming the malware has not evolved into a new variant that stores its executables outside of the typical Windows install. In the event that the encryption has begun, the computer must still be powered off, as this will halt the process and leave the unaffected data available for retrieval. If this is the case the hard drive must be replaced as it is no longer able to be used safely. For NotPetya, the ID shown in the ransom screen is random data and therefore even payment to the threat actor will not resolve the attack. If AI engines are available, the security team will be able to update the rules to successfully detect elements of the infection and propagation. In addition to the above, a robust anti-malware suite with embedded anti-ransomware protection should be part of all of the systems, including any remote systems or laptops used by the sales team in the field. Update Microsoft Windows and all third party software. Ensure comprehensive cybersecurity training for all personnel that perform any work on the computers within the company. This training should include how to identify phishing emails, social data gathering, and instructions on routine backup techniques with an emphasis on data validation.
  • 14. Team NotPetya WalterWhite Laboratories Dec. 2018 14 of 14 Team NotPetya WalterWhite Laboratories Dec. 2018 Summary NotPetya represents the evolution of cybersecurity attacks not just in terms of the methodology used, but in the intent. NotPetya combines ransomware with the ability to propagate itself across a network. Built upon a relatively unsuccessful ransomware (Petya), the malware binary tries to extract logins and passwords of users with the effort of lateral movement through a local network if administrative credentials are gained. The second function of NotPetya is to make irreversible modifications to the Master Boot Record and then force a reboot of the system at which point a disk repair message is displayed. This disk repair is in reality, the attack of the fixed drives on the system, encrypting all the files.