WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms

Authors

  • Maxat Akbanov
  • Vassilios G. Vassilakis
  • Michael D. Logothetis

DOI:

https://doi.org/10.26636/jtit.2019.130218

Keywords:

dynamic malware analysis, ransomware, WannaCry

Abstract

In recent years, we have been experiencing fast proliferation of different types of ransomware targeting home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that received significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware. Dynamic analysis techniques are typically used to achieve that purpose, where the malicious binaries are executed in a controlled environment and are then observed. In this work, the dynamic analysis results focusing on the infamous WannaCry ransomware are presented. In particular, WannaCry is examined, during its execution in a purpose-built virtual lab environment, in order to analyze its infection, persistence, recovery prevention and propagation mechanisms. The results obtained may be used for developing appropriate detection and defense solutions for WannaCry and other ransomware families that exhibit similar behaviors

Downloads

Download data is not yet available.

Downloads

Published

2019-03-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms”, JTIT, vol. 75, no. 1, pp. 113–124, Mar. 2019, doi: 10.26636/jtit.2019.130218.

Most read articles by the same author(s)