Forensic Analysis of Ransomware Infected Windows Hard Disk A Case Study
Forensic Analysis of Ransomware Infected Windows Hard Disk A Case Study
ISSN No:-2456-2165
Reasonable amount of literature exists on incidence Out of different types of malwares this report
response to malware attack, dynamic analysis of emphasizes on the Digital Forensic Investigation of
malware and indicators of compromise of malware. ‘wannacry’ ransomware infected Windows operating system
However, how one can perform such malware analysis in using various open-source and licensed forensic tools and
a forensic laboratory is not well described. In the present techniques. In this report authors discussed about forensic
paper the authors describe forensic artifacts discovered analysis of ransomware in a static manner so that analysts do
on examination of a hard disk infected with ‘wannacry’ not have to access the files in the infected disk but ICP’s
ransomware following static digital forensic analysis (Indicators of Compromise) can be revealed by using both
method. During forensic examination it has been open-source forensic tools and licensed forensic tools.
observed that artifacts recovered are not an exact match
with artifacts described in available literature. II. BRIEF CASE HISTORY
Moreover, some additional artifacts could be found
during forensic examination. During this examination An independent business unit which supplies Telecom
authors tried to establish a guideline in general to and Network Services complained they are unable to access
examine cases involving malware, so that, security of the their important files and unable to run some programs critical
laboratory should not be compromised and loss of to their business. The investigation agency seized the hard
valuable resources can be prevented during forensic disk of particular computer and submitted for Digital
examination. Forensic examination.
Analysis by Extensions:
All the extension starting from ‘wnry’ was enlisted. It is
found that extensions ‘wnry’, ‘wncry’, ‘wncryt’ are available
around the suspected timeline.
Litreature Review:
On the basis of above observations, we followed some
literature and articles which indicated a ransomware called
‘wannacry’ is available and attack on various system were
worldwide reported during the same timeline[5]. Indicators
of compromise were also reported in various attacks.
Registry Forensics: Fig 5:- Warning message for files being encrypted
NTUSER.DAT is a file that is available in Windows
operating system and it stores the information of the user Files ‘@[email protected]’ found which contains
account settings and customizations. Each user has their own instruction to decrypt files on paying ransom (fig.6).
NTUSER.DAT[6] file in their user’s profile in hidden form
in the path ‘C:\Users\Username’. This file ensures that any
changes made in user account are saved. This DAT file was
extracted from the E01 image loaded in Encase and analysed
using Regripper (open-source) forensic registry analysis
software.
V. OBSERVATIONS
Files named ‘b.wnry’, ‘c.wnry’, ‘r.wnry’, ‘s.wnry’, Fig 6:- Files containing instruction for paying ransom
‘t.wnry’, ‘u.wnry’, ‘f.wnry’, ‘taskdl.exe’, ‘taskse.exe’ and
‘tasksche.exe’ could be found which are also available in Registry analysis indicates ‘WanaCrypt0r’ is among the
literatures[7, 8]. software key with last write time ‘2017-05-17 09:38:55’
Hash values of the files may differ from one instance to (fig.7). The traces of execution of
other as observed from literature. In this case also some ‘@[email protected]’ were also found in several
of the hash values were different and others matched with occasions in registry hive which certainly establish
some of the reported cases. execution of malicious file to infect the operating system.
The hash values of b.wnry, s.wnry, could be verified as
malicious by virustotal[9], however, other hash values
could not be verified as malicious. Details of MD5 hash
values as found in this case are provided in the following
table:
REFERENCES