Variants of Petya Ransomware Spreading with EternalBlue
It has been reported that variants of Petya ransomware with worm-like capabilities is spreading. The ransomware leverages etenalblue exploit, genuine psexec or wmic with appropriate credentials for a quick spread.
These mechanisms are used to attempt installation and execution of the dropped file "C:\Windows\perfc.dat" on other devices to spread laterally. The dropped file, if managed to get the Administrator privileges, will encrypt the Master File Tree (MFT) tables for NTFS partitions and overrides the Master Boot Record (MBR) with a custom bootloader making the system unusable. Further the malware creates a scheduled task via schtasks /at to reboot the system one hour after infection. After the system is reloaded the malware downloads its code from MBR and encrypts data on the hard drive.
In case the fail to get the privileges rewrite MBR, the files are encrypted without a system reload. The list of file types that are encrypted:
3ds, 7z, accdb, ai, asp, aspx, avhd, back, bak, c, cfg, conf, cpp, cs, ctl, dbf, disk, djvu, doc, docx, dwg, eml, fdb, gz, h, hdd, kdbx, mail, mdb, msg, nrg, ora, ost, ova, ovf, pdf, php, pmf, ppt, pptx, pst, pvi, py, pyc, rar, rtf, sln, sql, tar, vbox, vbs, vcb, vdi, vfd, vmc, vmdk, vmsd, vmx, vsdx, vsv, work, xls, xlsx, xvd, zip.
The spreading mechanism thus far is by;
- EternalBlue - the same exploit used by WannaCry.
- Psexec - a legitimate Windows administration tool. C:\WINDOWS\dllhost.dat \\w.x.y.z -accepteula -s -d C:\Windows\System32\rundll32.exe C:\Windows\perfc.dat,#1 [dllhost.dat is psexec.exe]
- WMI - Windows Management Instrumentation, a legitimate Windows component. Wbem\wmic.exe /node:"w.x.y.z" /user:"username" /password:"password" "process call create "C:\Windows\System32\rundll32.exe \"C:\Windows\perfc.dat\" #1" [ there are unconfirmed reports about the usage of mimikaz /lsadump to get the system credentials]
There are open source reports about the usage of Microsoft Office HTA handler vulnerability [CVE-2017-0199] as one of the infection vector.
The malware clears system logs using the following command:
"wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D %c:" to make further analysis more difficult.
Potential Indicators of compromises
- ip: 95.141.115.108
- ip-dst: 185.165.29.78
- ip-dst: 84.200.16.242
- ip-dst: 111.90.139.247
- domain: coffeinoffice.xyz
- domain: french-cooking.com
- domain: sundanders.online
- url: http[:]//french-cooking[.]com/myguy[.]exe
- url: http[:]//84[.]200[.]16[.]242/myguy[.]xls
- url: http[:]//84[.]200[.]16[.]242/Profoma[.]xls
- url: http[:]//84[.]200[.]16[.]242/Lucky[.]exe
- url: http[:]//185.165.29.78/~alex/svchost.exe
- sha256: 02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f
- sha256: eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998
- sha256: 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1
- sha256: 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
- sha256: fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206
- sha256: ee29b9c01318a1e23836b949942db14d4811246fdae2f41df9f0dcd922c63bc6
- md5: 9B853B8FE232B8DED38355513CFD4F30
- md5: CBB9927813FA027AC12D7388720D4771
- md5: a809a63bc5e31670ff117d838522dec433f74bee
- md5: bec678164cedea578a7aff4589018fa41551c27f
- md5: d5bf3f100e7dbcc434d7c58ebf64052329a60fc2
- md5: aba7aa41057c8a6b184ba5776c20f7e8fc97c657
- md5: 0ff07caedad54c9b65e5873ac2d81b3126754aac
- md5: 51eafbb626103765d3aedfd098b94d0e77de1196
- md5: 078de2dc59ce59f503c63bd61f1ef8353dc7cf5f
- md5: 7ca37b86f4acc702f108449c391dd2485b5ca18c
- md5: 2bc182f04b935c7e358ed9c9e6df09ae6af47168
- md5: 1b83c00143a1bb2bf16b46c01f36d53fb66f82b5
- md5: 82920a2ad0138a2a8efc744ae5849c6dde6b435d
- sha256: 22053C34DCD54A5E3C2C9344AB47349A702B8CFDB5796F876AEE1B075A670926
- sha256: 1FE78C7159DBCB3F59FF8D410BD9191868DEA1B01EE3ECCD82BCC34A416895B5
- sha256: EEF090314FBEC77B20E2470A8318FC288B2DE19A23D069FE049F0D519D901B95
- filename: C:\0487382a4daf8eb9660f1c67e30f8b25.hta
- filename: petrwrap.exe
- filename: C:\027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745.bin.dll
- filename: Order-20062017.doc
- filename: myguy[1].hta
- filename: myguy.xls
- filename: dllhost.dat
- named pipe: {df458642-df8b-4131-b02d-32064a2f4c19}
- emails: wowsmith123456@posteo.net
- emails: wowsmith123456@posteo.net
- emails: iva76y3pr@outlook.com
- emails: carmellar4hegp@outlook.com
- emails: amanda4li8sq@outlook.com
Recommendations
- In order to prevent infection, users and organizations are advised to apply patches to
Windows systems as mentioned in Microsoft Security Bulletin MS17-010.
https://technet.microsoft.com/library/security/MS17-010 - Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
- Block SMB ports on Enterprise Edge/perimeter network devices [UDP 137, 138 and TCP 139, 445]
or Disable SMBv1.
https://support.microsoft.com/en-us/help/2696547 - Applocker policies to block execution of files having name perfc.dat as well as psexec.exe utility from sysinternals.
- A quick fix to prevent by creating the files (perfc, perfc.dll, and perfc.dat) to already
exist on the Windows machine, under C:\Windows, with READONLY permissions. A brief
description is here:
https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/ - Yara Rules for Petya detections can be seen here [kaspersky.yara] and here [florian.yara]
- Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization's website directly through browser.
- Restrict execution of powershell /WSCRIPT/ PSEXEC / WMIC in enterprise environment Ensure installation and use of the latest version (currently v5.0) of PowerShell, with enhanced logging enabled. script block logging, and transcription enabled. Send the associated logs to a centralized log repository for monitoring and analysis.
- Establish a Sender Policy Framework (SPF),Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.
- Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%, %PROGRAMDATA% and %TEMP% paths. Ransomware sample drops and executes generally from these locations. Enforce application whitelisting on all endpoint workstations.
- Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable antivirus solution.
- Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.
- Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
- Maintain updated Antivirus software on all systems.
- Consider installing Enhanced Mitigation Experience Toolkit, or similar host-level anti-exploitation tools.
- Block the attachments of file types,
exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf - Regularly check the contents of backup files of databases for any unauthorized encrypted contents of data records or external elements, (backdoors /malicious scripts.)
- Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches.
- Follow safe practices when browsing the web. Ensure the web browsers are secured enough with appropriate content controls.
- Network segmentation and segregation into security zones - help protect sensitive information and critical services. Separate administrative network from business processes with physical controls and Virtual Local Area Networks.
- Disable remote Desktop Connections, employ least-privileged accounts.
- Ensure integrity of the codes /scripts being used in database, authentication and sensitive systems, Check regularly for the integrity of the information stored in the databases.
- Restrict users' abilities (permissions) to install and run unwanted software applications.
- Employ data-at-rest and data-in-transit encryption.
Removal Tools:
References
- https://isc.sans.edu/forums/diary/Checking+out+the+new+Petya+variant/22562/
- https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know
- https://securelist.com/petrwrap-the-new-petya-based-ransomware-used-in-targeted-attacks/77762/
- http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html
- http://blogs.seqrite.com/petya-ransomware-is-affecting-users-globally-here-are-things-you-can-do/
- http://www.cyberswachhtakendra.gov.in/alerts/ransomware.html