App Review More Fun with Ransomware Part 6

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,149
Jack posted an article earlier today about the CrySIS ransomware. Although the original form has been around for a couple of months, a new variant is now seen.

Just wanted to show how UAC will deal with this threat.

 

marzametal

Level 7
Verified
Jun 10, 2014
316
Wow, UAC is crap in this situation. Is it bypassing UAC altogether, or just executing during the "stalemate period" where user has to click on Yes/No? Could that file be downloaded intentionally if the user applies "common sense techniques"?
 

SHvFl

Level 35
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Nov 19, 2014
2,346
I might be missing something so i will write what i believe and you correct me if you can.
Can't it be that the ransomware is coded to just encode stuff, not in locations protected from UAC, when you click no?
UAC did what is designed to do. Block elevation. No?
Did they actually get elevation?
 

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,149
My original intent for this video was to run it against my normal stable of AntiRansomware apps, but just as I finished a beta of HMPA came out, so as including a fresh beta would have been extreme poor form I scrapped it and did this one.

The reason for the UAC topic is to attempt to dispel false impressions regarding UAC that many hold (I've received a number of comments privately about this). Actually it isn't really a big deal to totally bypass UAC once a few coding methods are known (curiously enough, TrendMicro products will also change the UAC level to what they deem appropriate- which is default- without a user prompt).
 
Last edited:

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
UAC can be bypassed. There is a lot of mis-information about UAC. Plus, M$ has a wishy-washy history of fixing UAC bugs and vulnerabilities.
Agreed hjlbx, that's where VooDooShield shines as a UAC surrogate.
Thanks CruelSis, Awesome Vid as usual.
Now maybe some will be less critical of those who use VooDoo & other UAC alternatives and disable the lacking and unimpressive UAC.
PeAcE
 
Last edited:

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
UACMe v2.3 should bypass UAC from Windows 7 up to Windows 10 RS1 14367 build, am I wrong ?
=> Builds 14361, 14366, 14367 seem to have zero UAC related changes
UAC can be bypassed. There is a lot of mis-information about UAC. Plus, M$ has a wishy-washy history of fixing UAC bugs and vulnerabilities.
Honestly Microsoft must improve and revise the functionality of UAC, considering that the flow of concept is already expose hence its an easy bypass.
3rd party programs goes here.
I fully agree :) (but we might let UAC at max)
Can ransomware encrypt raw unallocated space? eg: a 2gb chunk sitting between C drive and D drive.
I Never read about a ransomware that does this.
They often only encrypt files that can have some sort of value or importance (with predefined extension), or all data on a drive (C: , D: , etc) , on cloud (if accessible) - without take care of file extension - to ask a ransom after the encyption.
But this is almost any time the same thing : loop on drives/files/folders and encrypt them (write on MBR for some ransomware).
On a "raw unloccated space", no name of drives/files/folders to put as parameter to their encrypting procedure.
That's only my point of view, I can be Wrong :)
 
Last edited:

marzametal

Level 7
Verified
Jun 10, 2014
316
Hmmmm, I wonder if there is a way to implement a block on sector level that uses raw unallocated space as a "cement" firewall... eg: trying to cross a creek that contains 3 large stones, but the gap between 2nd and 3rd stone is too large for a leap/jump... can't cross, so it stalls.

EDIT: maybe I am clutching at straws...
 

DJ Panda

Level 30
Verified
Top Poster
Well-known
Aug 30, 2015
1,928
Just because UAC can be bypassed by malware is no excuse for having it disabled. It works at kernal level and if think before clicking "yes" or "accept" (for anything in general) there would be a lot less tears and sweat trying to clean a computer from someone who fell victim.
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
Hmmmm, I wonder if there is a way to implement a block on sector level that uses raw unallocated space as a "cement" firewall... eg: trying to cross a creek that contains 3 large stones, but the gap between 2nd and 3rd stone is too large for a leap/jump... can't cross, so it stalls.
EDIT: maybe I am clutching at straws...
It doesn't work this way. A ransomware just can encrypt all files on a partition after "asking" to your OS the list, and making a loop in a procedure with each name to encrypt them (if these files are not protected). As soon as you OS has access to a file (folder) / knows a file (folder), the ransomware can have the list.
Why don't you use Bitlocker to protect the most Drive you can ? Or another similar tool ?
That's only my point of view, I can be Wrong :)
 
Last edited:

AlphaBeta

Level 3
Verified
Well-known
Oct 24, 2015
116
Well it wasn't given administrator permissions so the system folders should be safe. As a regular program, I think it can encrypt the files in user folder and other partitions.
 
  • Like
Reactions: XhenEd

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
UACMe v2.3 should bypass UAC from Windows 7 up to Windows 10 RS1 14367 build, am I wrong ?
=> Builds 14361, 14366, 14367 seem to have zero UAC related changes

Windows 14371 unexpectedly bring another fixes to UAC (against several UACMe methods) . Some tweaking in 14376 build seems fixed dll search order for InetMgr.exe when it was possible to load your own mscoree.dll from inetsrv directory. Now InetMgr.exe executed via ShellExecute(Ex) API lookups dlls in the system32 folder. So to make it load malicious dll it is now required launch it from already admin process, which makes it nonsense. Nice work. Why this wasn't here since beginning ? :rolleyes:
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top