Comments (9)

  1. Simon says:

    Thanks for sharing. Very informative

  2. Aurelien Desseaux says:

    Thanks for this article. Could you confirm that System center endpoint protection is aware of this processes and block them effitiently please ?

    1. Aurelien Desseaux says:

      I got the Tam info, thanks MS Av detect and block this threat with definition 1.247.197.0 from 27 juin 2017 at 12:04:25

  3. Yoshihiro Kawabata says:

    Thank you, detail information about this malware

  4. Max says:

    > Only if the malware is running with highest privilege (i.e., with SeDebugPrivilege enabled), it tries to overwrite the MBR code.
    so what’s going on if the malware is not running with the SeDebugPrivilege enabled (cannot write to MBR) will it still encrypt the files ?

  5. David says:

    Page above states: “We recommend customers that have not yet installed security update MS17-010 to do so as soon as possible.”
    When I look at my windows 10 update page it makes no mention of MS17-010

    I just see things like: “Microsoft .NET Framework 4.7 for Windows 10 Version 1607 and Windows Server 2016 for x64 (KB3186568)” and further down “2017-06 Update for Windows 10 Version 1607 for x64-based Systems (KB4023834)”

    You would have thought Microsoft would at least use the same language people see in their update page.

    1. Paul Prior says:

      You already have it installed. W10 uses cumulative updates covering multiple exploits and this was included in the March 2017 cumulative update. That said, install all those other patches as one of them is the June cumulative update which closes other possible exploits.

  6. Caleb says:

    Nice job!! Thanks for sharing so important info.

  7. Zer says:

    When the files are crypted ? Before or after reboot ?

    Bitlocker can protect that ?

Skip to main content