Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,488
The real problem with EternalBlue & DoublePulsar exploits (used by WannaCry ransomware) is the ability to remotely patch the kernel memory of the victim machine. The code is next extracted from the memory, dropped on the disk in the form of DLLs, and injected to the system processes. All of this is done on the Kernel-level. I found an interesting article about the injection details of DoublePulsar, and it seems that the injection is a very unusual one:
Analyzing the DOUBLEPULSAR Kernel DLL Injection Technique | Countercept
From the above it follows, that some default deny security solutions, like Windows Software Restriction Policies and Anti-exe, cannot stop EternalBlue & DoublePulsar worm. Yet, the home users are still well protected, because the home networks are typically under the NAT, and the worm uses port 445 that is closed by default. Running the malware by the user is blocked/alerted by default deny security.
The problem arises when the machine is connected to the big local network like in enterprises.
Running the shellcode on the Kernel-level is not so easy. For example the EternalBlue can run from the memory only itself and DoublePulsar, and it seems that it works well only on Windows 7.
There is an open question, if the other default deny solutions (including autosandboxing) can stop the EternalBlue & DoublePulsar worm, especially: Applocker, No Virus Thanks SOB, Comodo Firewall (autosandbox), AppGuard, etc.
Analyzing the DOUBLEPULSAR Kernel DLL Injection Technique | Countercept
From the above it follows, that some default deny security solutions, like Windows Software Restriction Policies and Anti-exe, cannot stop EternalBlue & DoublePulsar worm. Yet, the home users are still well protected, because the home networks are typically under the NAT, and the worm uses port 445 that is closed by default. Running the malware by the user is blocked/alerted by default deny security.
The problem arises when the machine is connected to the big local network like in enterprises.
Running the shellcode on the Kernel-level is not so easy. For example the EternalBlue can run from the memory only itself and DoublePulsar, and it seems that it works well only on Windows 7.
There is an open question, if the other default deny solutions (including autosandboxing) can stop the EternalBlue & DoublePulsar worm, especially: Applocker, No Virus Thanks SOB, Comodo Firewall (autosandbox), AppGuard, etc.