Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Threat detection

Detecting Ransomware: Behind the Scenes of an Attack

Julie Brown
Originally published . Last modified .

Ransomware has been the threat of the year. If you’ve had even a lazy eye on current events in information security, you’ve heard about the WannaCry infection that recently took out endpoints for hundreds of companies. By now you’ve (hopefully) patched all of your vulnerable Windows systems—but don’t relax just yet! There are still plenty of active ransomware campaigns, like SyncCrypt, GlobeImposter, and Locky, to name a few. It goes without saying that many organizations are concerned about detecting ransomware and how to prevent it.

Red Canary recently caught a ransomware campaign in the wild and quickly notified our customer before it spread across their network. This infection appeared similar to Matrix ransomware. Three key observations led us to pick up on the initial infection:

  • Portable executable with an .hta file extension
  • Lack of signature on the running executable
  • File hash shown as malicious on multiple reputation websites.

We are frequently asked how we detect ransomware infections and what is provided to our customer. We’ll use snapshots from the actual threat detection to illustrate the attack timeline and show what happened in the moments following initial infection.

Detecting Ransomware: Threat Detection Timeline

It all started when an executable file named index[1].htm was downloaded using Internet Explorer. The victim downloaded this file during an otherwise normal browsing session. Within seconds, the initial download spawned a randomly named executable that modified almost three thousand files and made over six thousand network connections.

Detecting Ransomware
Malicious htm file spawning the main ransomware executable

The initial event was identified by the Red Canary Detection Engine. The Red Canary analyst running the investigation immediately jumped to the Carbon Black Response platform to dig deeper. One running instance of the malicious binary immediately stood out as a prime suspect for useful forensic information.

Detecting Ransomware
Ransomware executable spawning multiple instances of cmd.exe

By focusing on this malicious process, we saw every associated encryption of the victim’s files. This specific strain of ransomware encrypted all files in a directory, and then placed a text file in that folder with instructions for paying the ransom and regaining access to the files.

Detecting Ransomware
Carbon Black data showing the victim’s files being encrypted

Immediately after encrypting the victim’s files, the ransomware ran cleanup operations. Using vssadmin to delete device backups, the malicious process made quick work of the victim’s only way to restore unencrypted data.

Detecting Ransomware
Vssadmin utility deleting device backups

The use of vssadmin by ransomware campaigns is so widespread that some have even suggested disabling vssadmin altogether, and instead using wmic.exe to create device backup files. This technique could help in some cases, but WannaCry also uses wmic, wbadmin, and bcdedit to delete all connected backups and disable recovery mode. Clearly, offline backups will only be more important as ransomware capabilities continue to grow.

Once the victim’s backups were deleted, a text file was created with instructions for paying a bitcoin ransom and restoring the encrypted files.

Detecting Ransomware
Text file with recovery instructions created on the victim’s desktop

This detection was sent to the customer immediately, and they were able to isolate and remediate the endpoint before the infection could spread. We haven’t seen any evidence of ransomware on their network since this event. Without endpoint visibility, this could have been a much bigger problem.

It’s a reminder of how important it is to have multiple layers of defense. Obviously you want to prevent as much as you can. But threats will still get through. When they do, it is critical that you have visibility across your environment, you have solutions in place to detect threats, and then have the resources to rapidly respond.

You Might Also Like:

 

Artificial authentication: Understanding and observing Azure OpenAI abuse

 

Apple picking: Bobbing for Atomic Stealer & other macOS malware

 

Keep track of AWS user activity with SourceIdentity attribute

 

Trending cyberthreats and techniques from the first half of 2024

Subscribe to our blog

 
 
Back to Top