{"id":6423,"date":"2017-01-30T03:00:36","date_gmt":"2017-01-30T11:00:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/30\/news-260\/"},"modified":"2017-01-30T03:00:36","modified_gmt":"2017-01-30T11:00:36","slug":"news-260","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/30\/news-260\/","title":{"rendered":"Averting ransomware epidemics in corporate networks with Windows Defender ATP"},"content":{"rendered":"<p>Microsoft security researchers continue to observe <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/05\/18\/the-5ws-and-1h-of-ransomware\/\">ransomware<\/a> campaigns blanketing the market and indiscriminately hitting potential targets. Unsurprisingly, these campaigns also continue to use email and the web as primary delivery mechanisms. Also, it appears that most <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/11\/28\/san-francisco-muni-hacked-ransomware\">corporate victims<\/a> are simply caught by the wide nets cast by ransomware operators. Unlike cyberespionage groups, ransomware operators do not typically employ special tactics to target particular organizations.<\/p>\n<p>Although indiscriminate ransomware attacks are very much like commodity malware infections, the significant cost that can result from a broad ransomware attack justifies consideration of a layered, defense-in-depth strategy that covers protection, detection, and response. As attacks reach the post-breach or post-infection layer\u2014when endpoint antimalware fails to stop a ransomware infection\u2014enterprises can benefit from post-breach detection solutions that provide comprehensive artifact information and the ability to quickly pivot investigations using these artifacts.<\/p>\n<p>Our research into prevalent ransomware families reveals that delivery campaigns can typically stretch for days or even weeks, all the while employing similar files and techniques. As long as enterprises can quickly investigate the first cases of infection or \u2018patient zero\u2019, they can often effectively stop ransomware epidemics. With <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> (Windows Defender ATP), enterprises can quickly identify and investigate these initial cases, and then use captured artifact information to proactively protect the broader network.<\/p>\n<p>In this blog, we take a look at an actual <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Cerber\">Cerber ransomware<\/a> infection delivered to an enterprise endpoint by a campaign that ran in late November 2016. We look at how Windows Defender ATP, in the absence of endpoint antimalware detections, can flag initial infection activity and help enterprises stop subsequent attempts to infect other devices.<\/p>\n<h2>Detecting Cerber ransomware behavior<\/h2>\n<p>In an <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/12\/21\/no-slowdown-in-cerber-ransomware-activity-as-2016-draws-to-a-close\/\">earlier blogpost<\/a>, we described how the Cerber ransomware family has been extremely active during the recent holiday season. It continues to be one of the most prevalent ransomware families affecting enterprises as shown in Figure 1. Not only are there similarities between members of this well-distributed ransomware family, certain Cerber behaviors are common malware behaviors. Detecting these behaviors can help stop even newly distributed threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"410\" class=\"alignnone wp-image-10956\" alt=\"Ransomware encounters on enterprise endpoints\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-1-Ransomware-encounters-on-enterprise-endpoints.png\" \/><\/p>\n<p><i>Figure 1. Ransomware enc<\/i><i>ounters on enterprise endpoints<\/i><\/p>\n<p>&nbsp;<\/p>\n<h3>A real case of Cerber meeting Windows Defender ATP<\/h3>\n<p>The Cerber ransomware infection started with a document downloaded into the <em>Downloads<\/em> folder through a webmail client. A user opened the document and triggered an embedded macro, which in turn launched a PowerShell command that downloaded another component carrying the ransomware payload. As shown below, the PowerShell command was detected by Windows Defender ATP.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"445\" class=\"alignnone wp-image-10965\" alt=\"PowerShell command detection\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-2-PowerShell-command-detection.png\" \/><\/p>\n<p><em>Figure <\/em><em>2<\/em><em>. PowerShell command detection<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Windows Defender ATP also generated an alert when the PowerShell script connected to a TOR anonymization website through a public proxy to download an executable. Security operations center (SOC) personnel could use such alerts to get the source IP and block this IP address at the firewall, preventing other machines from downloading the executable. In this case, the downloaded executable was the ransomware payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"156\" class=\"alignnone wp-image-10966\" alt=\"Alert for the TOR website connection showing the source IP address\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-3-Alert-for-the-TOR-website-connection-showing-the-source-IP-address.png\" \/><\/p>\n<p><em>Figure <\/em><em>3<\/em><em>. Alert for the TOR website connection showing the source IP address<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>After the payload was downloaded into the <em>Temp<\/em> directory, it was then executed by a parent <em>cmd.exe<\/em> process.\u00a0 The payload created a copy of itself in the <em>Users<\/em> folder and then launched that copy. Machine learning algorithms in Windows Defender ATP were able to detect this self-launching behavior.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"216\" class=\"alignnone wp-image-10975\" alt=\"Ransomware launching copy of itself as detected on Windows Defender ATP\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-4-Ransomware-launching-copy-of-itself-as-detected-on-Windows-Defender-ATP.png\" \/><\/p>\n<p><em>Figure <\/em><em>4<\/em><em>. Ransomware launching copy of itself as detected on Windows Defender ATP<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Just prior to encrypting files, the Cerber ransomware tried to prevent future attempts at file recovery by deleting system restore points and all available volume shadow copies\u2014these are used by Windows System Restore and Windows Backup and Restore during recovery. This hostile behavior was also detected by Windows Defender ATP.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"353\" class=\"alignnone wp-image-10985\" alt=\"Deletion of volume shadow copies\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-5-Deletion-of-volume-shadow-copies.png\" \/><\/p>\n<p><em>Figure <\/em><em>5<\/em><em>. Deletion of volume shadow copies<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3>Breadth and depth of alerts enable easy scoping and containment<\/h3>\n<p>Windows Defender ATP generated at least four alerts during the infection process, providing a breadth of detections that provides coverage for changing techniques between Cerber versions, samples, and infections instances. To build up the mechanisms behind these alerts, Microsoft security researchers comb through ransomware families and identify common behaviors. Their research supports machine learning models and behavioral detection algorithms that detect ransomware at different stages of the kill chain, during delivery (by email or using exploit kits) up to the point when victims make ransom payments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"196\" class=\"alignnone wp-image-10995\" alt=\"Alerts that correspond to different kill stages\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-6-Deletion-of-volume-shadow-copies.png\" \/><\/p>\n<p><em>Figure <\/em><em>6<\/em><em>. Alerts that correspond to different kill stages<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Each alert provides additional context about the attack. In turn, SOC personnel can use this contextual information to pivot an investigation and get insights from endpoints across the organization. Using the provided file and network activity information, pivoting investigations in the Windows Defender ATP console can provide conclusive leads, even when no actual ransomware payload is detonated.<\/p>\n<p>To investigate our Cerber case, we use the name of the payload file <em>hjtudhb67.exe<\/em>, which is clearly unusual and not likely used by legitimate executables. A quick search on the Windows Defender ATP console yields 23 other files with the same name. The files were suspiciously created in a span of approximately 10 days and scattered across endpoints in the organization. (Note that although most of these files are artifacts from the actual infection, some are possibly remnants of tests by SOC personal who responded to the alerts.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"363\" class=\"alignnone wp-image-11015\" alt=\"Instances of file with the same unusual name as the ransomware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/01\/WDATP-Cerber-Figure-7b-Instances-of-file-with-the-same-unusual-name-as-the-ransomware.png\" \/><\/p>\n<p><em>Figure <\/em><em>7<\/em><em>. Instances of file with the same unusual name as the ransomware<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>We pivot to the source IP that hosted the payload file and perform a search to reveal that 10 machines connected to this IP address. Blocking this source IP on the corporate firewall on the day of the first infection could have helped prevent the Cerber ransomware payload file from reaching other machines.<\/p>\n<h2>Conclusion: Defense-in-depth with Windows Defender ATP<\/h2>\n<p>We have seen how Windows Defender ATP provides enterprise SOC personnel with a powerful view of events and behaviors associated with a ransomware infection, from the time of initial delivery and throughout the installation process. Enterprise SOC personnel are able to understand how ransomware has reached an endpoint, assess the extent of the damage, and identify artifacts that can be used to prevent further damage. These capabilities are made possible by cloud analytics that continuously search for and flag signs of hostile activity, including signs that could have been missed in other defensive layers.<\/p>\n<p>Upcoming enhancements to Windows Defender ATP with the <a href=\"https:\/\/blogs.windows.com\/business\/2016\/12\/06\/windows-10-creators-update-advances-security-best-class-modern-tools\/\">Windows 10 Creators Update<\/a> will take its capabilities one step further by enabling network isolation of compromised machines. The update will also provide an option to quarantine and prevent subsequent execution of files.<\/p>\n<p>Windows Defender ATP is built into the core of Windows 10 Enterprise and can be <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">evaluated free of charge<\/a>.<\/p>\n<h3>Windows 10 security against Cerber ransomware<\/h3>\n<p>Windows 10 is built with security technologies that can help detect the latest batch of Cerber ransomware.<\/p>\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> detects Cerber ransomware as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Cerber\">Win32\/Cerber<\/a>. It also detects files that assist in the distribution of the payload file using email and exploit kits. Malicious email attachments are detected as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=TrojanDownloader%3AO97M%2FDonoff\">TrojanDownloader:O97M\/Donoff<\/a>, and the RIG exploit kit is detected as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Exploit:HTML\/Meadgive.W\">Exploit:HTML\/Meadgive<\/a>.<\/li>\n<li>For security on the web, <a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/05\/11\/microsoft-edge-building-a-safer-browser\/\">Microsoft Edge<\/a> browser can help prevent exploit kits from running and executing ransomware on computers. <a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">SmartScreen Filter<\/a> uses URL reputation to block access to malicious sites, such as those hosting exploit kits.<\/li>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies\">Device guard<\/a> protects systems from malicious applications like ransomware\u00a0by maintaining a custom catalog of known good applications and stopping even kernel-level malware with virtualization-based security.<\/li>\n<li><a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a> also prevents dubious software from running.<\/li>\n<\/ul>\n<h3>Office and Office 365 security against Cerber ransomware<\/h3>\n<p><a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">Office 365 Advanced Threat Protection<\/a> blocks emails that spread malicious documents that could eventually install Cerber. IT administrators can use <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/22\/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection\/\">Group Policy in Office 2016<\/a> to prevent malicious macros inside documents\u00a0from running, such as the documents in password-protected attachments used commonly in Cerber campaigns.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Tommy Blizard <\/em><\/p>\n<p><em>Windows Defender ATP Research Team<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/01\/30\/averting-ransomware-epidemics-in-corporate-networks-with-windows-defender-atp\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft security researchers continue to observe ransomware campaigns blanketing the market and indiscriminately hitting potential targets. Unsurprisingly, these campaigns also continue to use email and the web as primary delivery mechanisms. Also, it appears that most corporate victims are simply caught by the wide nets cast by ransomware operators. Unlike cyberespionage groups, ransomware operators do&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10864,10760,11137,3765,10761,10762,10865],"class_list":["post-6423","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-advanced-persistent-threats","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-creators-update","tag-ransomware","tag-windows-10","tag-windows-defender","tag-windows-defender-atp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}