{"id":57131,"date":"2017-06-01T11:58:18","date_gmt":"2017-06-01T16:58:18","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57131"},"modified":"2017-06-01T11:58:18","modified_gmt":"2017-06-01T16:58:18","slug":"wanacrypt0r-analysis-part-ii-smb-exploit-worm-component","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/","title":{"rendered":"WanaCrypt0r Analysis Part II &#8211; SMB Exploit and Worm Component"},"content":{"rendered":"<h1>Introduction<\/h1>\n<p>Part II of the WanaCrypt0r code analysis has arrived. We&#8217;re going to be starting out where we left off last time, which is with the Microsoft Windows MS17-010 Server Message Block (SMB) exploit\/&#8221;worm component&#8221; that made the ransomware so dangerous by allowing it to spread to other vulnerable (not patched) systems on the network without the computer users having to click a single thing. The reason why we&#8217;re going to look at this component first is because it is part of the original executable file that initiates WanaCrypt0r. We will also be looking at the attached, compressed, resource files and their functionality in a subsequent post. Let&#8217;s first look at a high-level view of what the SMB exploit even is, what it does, and then how WanaCrypt0r uses it.<\/p>\n<h1>What is this SMB exploit that we speak of?<\/h1>\n<p>In order to understand the exploit, it helps to understand what Windows Server Message Block is in the first place. Let&#8217;s have a look at the official description of SMB from <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/hh831795(v=ws.11).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>:<\/p>\n<blockquote><p>The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network. The SMB protocol can be used on top of its TCP\/IP protocol or other network protocols. Using the SMB protocol, an application (or the user of an application) can access files or other resources at a remote server. This allows applications to read, create, and update files on the remote server. It can also communicate with any server program that is set up to receive an SMB client request. Windows Server 2012 introduces the new 3.0 version of the SMB protocol.<\/p><\/blockquote>\n<p>This protocol was originally created by Barry Feigenbaum at IBM and was adopted by Microsoft Windows. It is the older Windows networking protocol which was more prominently used before Active Directory. The exploit CVE is <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-0145\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-0145<\/a> and it actually only affects SMBv1, when the current version of SMB is SMBv3. However, a major underlying problem with software, particularly that we&#8217;ve seen with Windows, is that businesses, organizations, and even home users will have specialized software and devices which are only compatible with certain, outdated versions of Windows. For this reason, software updates or operating system upgrades are often not installed, allowing for exploits like this to take advantage of older systems.<\/p>\n<h1>So how does SMB actually correspond to WanaCrypt0r?<\/h1>\n<p>Essentially, a Windows computer with SMBv1 installed and enabled would be sitting on a network and listening for connections on port 445. When a certain &#8220;special message&#8221; was sent to the machine on that port, this would allow an attacker to run a program on the machine without even being physically present and on the machine, <em>and without the computer&#8217;s user even taking any action at all<\/em>. So this is what happens:<\/p>\n<p>1. The attacker finds a way to get someone in a large (or small) network to open the WanaCrypt0r file. This is not very difficult with social engineering techniques and trickery.<\/p>\n<p>2. Once the original executable is opened <strong>and the killswitch is not enabled<\/strong>, WanaCrypt0r immediately scans the network and sends the &#8220;special message&#8221; to all of the computers on the network. This message triggers the exploit mentioned above and then allows WanaCrypt0r to copy and execute itself on the other computers on the network.<\/p>\n<p>3.This cycle continues and since the other component of WanaCrypt0r encrypts all data files on each machine, it locks up entire networks, halting businesses, schools, and other organizations.<\/p>\n<p>With all of that out of the way, let&#8217;s get back to the code behind WanaCrypt0r. We left off at the module where the ransomware executes <strong>StartServiceCtrlDispatcherA<\/strong> and passes a function start address, which I&#8217;ve named <strong>register_service<\/strong>. This means that when the malicious service that WanaCrypt0r created previously starts, it will immediately execute the code within <strong>register_service<\/strong>:<\/p>\n<figure id=\"attachment_57133\" aria-describedby=\"caption-attachment-57133\" style=\"width: 608px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/11_StartServiceCtrlDisp.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-57133\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/11_StartServiceCtrlDisp.png\" alt=\"StartServiceCtrlDispatcherA with SMB exploit\" width=\"608\" height=\"192\" \/><\/a><figcaption id=\"caption-attachment-57133\" class=\"wp-caption-text\">Start the SMB exploit module.<\/figcaption><\/figure>\n<h1>Windows Services<\/h1>\n<p>But what exactly does <strong>StartServiceCtrlDispatcherA<\/strong> do? The way the Windows service system works is that a <strong>Service Manager<\/strong> is part of the operating system and it is in charge of, you guessed it: managing the services. When a service is starting, it must first launch by using <strong>StartService<\/strong> and then within around 30 seconds of launching, it needs to call <strong>StartServiceCtrlDispatcher<\/strong> which tells the Service Manager which thread that the service will be running on and gives it control over the service. If you are confused about what a service is in the first place, it&#8217;s just a separate category for a program to run &#8220;in the background&#8221; and automatically start when the system boots up, so that it is not grouped with the other programs that the user has started like Firefox, Chrome, etc&#8230; Malware loves to utilize services to hide from the main Task Manager process list, but mostly to automatically start whenever the computer is turned on without the user knowing. A list of services can be viewed by pressing Ctrl+Shift+Escape and navigating to the services tab on Windows 7 and newer.<\/p>\n<p>So what code does the service execute once it&#8217;s handed over to the Service Manager? The below code sets up a Service Control Handler and then launches the exploit payload with a call to a function that I&#8217;ve named &#8220;fire_threads&#8221; because the function starts additional threads:<\/p>\n<figure id=\"attachment_57143\" aria-describedby=\"caption-attachment-57143\" style=\"width: 811px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/register_service_final.png\"><img decoding=\"async\" class=\"wp-image-57143 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/register_service_final.png\" alt=\"\" width=\"811\" height=\"460\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/register_service_final.png 811w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/register_service_final-768x436.png 768w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/a><figcaption id=\"caption-attachment-57143\" class=\"wp-caption-text\">Register Service Control Handler followed by a call to fire_threads<\/figcaption><\/figure>\n<figure id=\"attachment_57136\" aria-describedby=\"caption-attachment-57136\" style=\"width: 570px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fire_threads.png\"><img decoding=\"async\" class=\"size-full wp-image-57136\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fire_threads.png\" alt=\"Inside of fire_threads\" width=\"570\" height=\"643\" \/><\/a><figcaption id=\"caption-attachment-57136\" class=\"wp-caption-text\">Inside of fire_threads<\/figcaption><\/figure>\n<p>Notice the highlighted subroutine which I&#8217;ve named <strong>smb_exploits<\/strong>. This doesn&#8217;t get directly called, but instead, it gets pushed to <strong>_beginthreadex<\/strong> as a function pointer and then <strong>_beginthreadex <\/strong>in turn starts a thread and finally executes the smb_exploits code. Let&#8217;s look into smb_exploits to get to the bottom of this exploit.<\/p>\n<figure id=\"attachment_57144\" aria-describedby=\"caption-attachment-57144\" style=\"width: 701px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/smb_exploits.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-57144\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/smb_exploits.png\" alt=\"Get IP Address of network adapter and prepare to start a thread\" width=\"701\" height=\"498\" \/><\/a><figcaption id=\"caption-attachment-57144\" class=\"wp-caption-text\">Notice the call to Get_IP_Addresses and the address of _beginthreadex being stored in ebp for future usage.<\/figcaption><\/figure>\n<h1>Finding victim computers on the network<\/h1>\n<p><strong>Get_IP_Addresses<\/strong> is a function which in turns calls <strong>GetAdaptersInfo<\/strong> and several other common networking functions like <strong>htons, htonl, <\/strong>and<strong> ntohl<\/strong>. These latter functions all convert data from big endian to little endian and vice versa because when data is sent over TCP\/IP, it is sent in big endian byte order whereas the x86 and x86-64 architectures operate in Little Endian. Thus, the conversion needs to be made at the endpoints for all network transactions. The question now is, why is WanaCrypt0r calling GetAdaptersInfo? According to the Microsoft Developer Network (MSDN), GetAdaptersInfo returns a pointer to this struct:<\/p>\n<blockquote><p>typedef struct _IP_ADAPTER_INFO {<br \/>\n<strong> struct _IP_ADAPTER_INFO *Next;<\/strong><br \/>\nDWORD ComboIndex;<br \/>\nchar AdapterName[MAX_ADAPTER_NAME_LENGTH + 4];<br \/>\nchar Description[MAX_ADAPTER_DESCRIPTION_LENGTH + 4];<br \/>\nUINT AddressLength;<br \/>\nBYTE Address[MAX_ADAPTER_ADDRESS_LENGTH];<br \/>\nDWORD Index;<br \/>\nUINT Type;<br \/>\nUINT DhcpEnabled;<br \/>\nPIP_ADDR_STRING CurrentIpAddress;<br \/>\n<strong> IP_ADDR_STRING IpAddressList;<\/strong><br \/>\nIP_ADDR_STRING GatewayList;<br \/>\nIP_ADDR_STRING DhcpServer;<br \/>\nBOOL HaveWins;<br \/>\nIP_ADDR_STRING PrimaryWinsServer;<br \/>\nIP_ADDR_STRING SecondaryWinsServer;<br \/>\ntime_t LeaseObtained;<br \/>\ntime_t LeaseExpires;<br \/>\n} IP_ADAPTER_INFO, *PIP_ADAPTER_INFO;<\/p><\/blockquote>\n<p>I&#8217;ve bolded a couple members of interest. First, <strong>struct _IP_ADAPTER_INFO *Next<\/strong> because this tells us that the data structure is a linked-list. As we can see here, this data structure contains a lot of useful information about the device&#8217;s network adapter, such as the adapter&#8217;s name and description. However, in this particular case, WanaCrypt0r is interested in the IP addresses that it is using, which are in the <strong>IpAddressList<\/strong> member. This is clear because right after calling GetAdaptersInfo, the malware calls <strong>inet_addr<\/strong> on the return struct at the locations of the IP addresses. <strong>inet_addr<\/strong> converts a string IP address, the way it is stored in the above data structure, to a proper <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms738571(v=vs.85).aspx\">IN_ADDR <\/a>IP address data structure for usage with the networking protocol. As you probably know, IPv4 addresses look like 127.0.0.1 for example. They are made up of 4 bytes, each byte can represent the number 0-255. The <strong>inet_addr<\/strong> function takes a string as input, like the 127.0.0.1 example, and splits the data into number data types so that the networking functions can reference each byte individually, by word (split in two), or as one full unit.<\/p>\n<p>WanaCrypt0r takes these IPs and uses them to attack other computers on the network in the next section. After gathering the IPs, it sleeps for a short while and then starts another thread which runs the below code:<\/p>\n<figure id=\"attachment_57149\" aria-describedby=\"caption-attachment-57149\" style=\"width: 764px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Check_Run_Exploit.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-57149 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Check_Run_Exploit.png\" alt=\"Check port 445, run exploit if check returns positive\" width=\"764\" height=\"624\" \/><\/a><figcaption id=\"caption-attachment-57149\" class=\"wp-caption-text\">Check port 445, run exploit if check returns positive.<\/figcaption><\/figure>\n<h1>Running the exploit<\/h1>\n<p>After sending some test packets to port 445 of other devices and getting positive feedback, it&#8217;s game time for WanaCrypt0r to exploit the SMB vulnerability. To do this, <strong>run_the_exploit<\/strong> has a bunch more networking functions, but it&#8217;s fairly obvious that this is the actual exploit payload because it uses the <strong>send<\/strong> network function to send data and when we view this data in the data section of the file, we can actually see the SMB exploit instructions:<\/p>\n<figure id=\"attachment_57150\" aria-describedby=\"caption-attachment-57150\" style=\"width: 348px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/exploit_send.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-57150 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/exploit_send.png\" alt=\"send function sending the exploit code\" width=\"348\" height=\"510\" \/><\/a><figcaption id=\"caption-attachment-57150\" class=\"wp-caption-text\">Send function sending the exploit code<\/figcaption><\/figure>\n<figure id=\"attachment_57151\" aria-describedby=\"caption-attachment-57151\" style=\"width: 379px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/SMB_data_1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-57151 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/SMB_data_1.png\" alt=\"data section showing the text being sent via the send function\" width=\"379\" height=\"109\" \/><\/a><figcaption id=\"caption-attachment-57151\" class=\"wp-caption-text\">Data section showing the text being sent via the send function<\/figcaption><\/figure>\n<figure id=\"attachment_57152\" aria-describedby=\"caption-attachment-57152\" style=\"width: 349px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Dialect.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-57152 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Dialect.png\" alt=\"Dialect negotiation process\" width=\"349\" height=\"623\" \/><\/a><figcaption id=\"caption-attachment-57152\" class=\"wp-caption-text\">Dialect negotiation process<\/figcaption><\/figure>\n<p>&#8220;PC Network Program 1.0 Lanman 1.0 Windows For Workgroups&#8221; is all part of establishing an SMB connection. <a href=\"http:\/\/www.informit.com\/articles\/article.aspx?p=130690&amp;seqNum=9\">This old Informit article<\/a> actually describes the process in detail and you can see this very step listed under the &#8220;Stage Two: Negotiating a Dialect&#8221; heading. As far as the actual data used to trigger the exploit, the disassembly looks like a bunch of shellcode but Exploit-DB has an example in C code <a href=\"https:\/\/www.exploit-db.com\/exploits\/42030\/\">here<\/a>.<\/p>\n<h1>Summary<\/h1>\n<p>To recap what we&#8217;ve covered in this post, WanaCrypt0r uses many new threads to probe the network for SMB vulnerability and then exploit it in order to spread to other machines and lock up their files. It does this in addition to the actual ransomware encryption component which we have not looked at yet. However, there are many pieces of ransomware out there such as Cerber, CryptoLocker, and Locky but this SMB exploit is what makes WanaCrypt0r so effective. Luckily, if you had PC Matic SuperShield, you would have already been protected against WanaCrypt0r, but it&#8217;s also good to make sure that you keep your software protected by downloading and installing the latest updates. Many times, the updates are released because security holes are found and patched up. Without utilizing these updates, the holes are left open and exploited by the bad guys. Of course the update notifications never appear at the right time, but it&#8217;s important to schedule an update during a time when the computer is not being used so that it does get done sooner rather than later. In fact, Microsoft had already released an update which would have completely prevented WanaCrypt0r from spreading if everyone had an up-to-date system. While this is unlikely, we can all do our best to protect ourselves when we understand the importance of updates.<br \/>\nThis will end the part of the WanaCrypt0r analysis which introduces the networking\/SMB exploit\/worm portion of the ransomware. In the next post, we will go over the details of the encrypted, attached resource file where WanaCrypt0r hides some code as well as bitcoin wallet and TOR addresses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Part II of the WanaCrypt0r code analysis has arrived. We&#8217;re going to be starting out where we left off last time, which is with the Microsoft Windows MS17-010 Server Message Block (SMB) exploit\/&#8221;worm component&#8221; that made the ransomware so dangerous by allowing it to spread to other vulnerable (not patched) systems on the network [&hellip;]<\/p>\n","protected":false},"author":68,"featured_media":57069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851,4949],"tags":[4363,5255,5254],"class_list":["post-57131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","category-ransomware","tag-ransomware","tag-wanacry","tag-wanacrypt0r"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component<\/title>\n<meta name=\"description\" content=\"Introduction Part II of the WanaCrypt0r code analysis has arrived. We&#039;re going to be starting out where we left off last time, which is with the Microsoft\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component\" \/>\n<meta property=\"og:description\" content=\"Introduction Part II of the WanaCrypt0r code analysis has arrived. We&#039;re going to be starting out where we left off last time, which is with the Microsoft\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-01T16:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Matic Malware Research\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Malware Research\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/\"},\"author\":{\"name\":\"PC Matic Malware Research\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\"},\"headline\":\"WanaCrypt0r Analysis Part II &#8211; SMB Exploit and Worm Component\",\"datePublished\":\"2017-06-01T16:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/\"},\"wordCount\":1947,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/wanacrypt.png\",\"keywords\":[\"ransomware\",\"wanacry\",\"wanacrypt0r\"],\"articleSection\":[\"Malware Research Team\",\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/\",\"name\":\"WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/wanacrypt.png\",\"datePublished\":\"2017-06-01T16:58:18+00:00\",\"description\":\"Introduction Part II of the WanaCrypt0r code analysis has arrived. We're going to be starting out where we left off last time, which is with the Microsoft\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/wanacrypt.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/wanacrypt.png\",\"width\":728,\"height\":410,\"caption\":\"Wanacrypt0r ransom screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WanaCrypt0r Analysis Part II &#8211; SMB Exploit and Worm Component\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\",\"name\":\"PC Matic Malware Research\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pc-matic-malware-research\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component","description":"Introduction Part II of the WanaCrypt0r code analysis has arrived. We're going to be starting out where we left off last time, which is with the Microsoft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/","og_locale":"en_US","og_type":"article","og_title":"WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component","og_description":"Introduction Part II of the WanaCrypt0r code analysis has arrived. We're going to be starting out where we left off last time, which is with the Microsoft","og_url":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-06-01T16:58:18+00:00","og_image":[{"width":728,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png","type":"image\/png"}],"author":"PC Matic Malware Research","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Malware Research","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/"},"author":{"name":"PC Matic Malware Research","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c"},"headline":"WanaCrypt0r Analysis Part II &#8211; SMB Exploit and Worm Component","datePublished":"2017-06-01T16:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/"},"wordCount":1947,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png","keywords":["ransomware","wanacry","wanacrypt0r"],"articleSection":["Malware Research Team","Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/","url":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/","name":"WanaCrypt0r Analysis Part II - SMB Exploit and Worm Component","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png","datePublished":"2017-06-01T16:58:18+00:00","description":"Introduction Part II of the WanaCrypt0r code analysis has arrived. We're going to be starting out where we left off last time, which is with the Microsoft","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wanacrypt.png","width":728,"height":410,"caption":"Wanacrypt0r ransom screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/wanacrypt0r-analysis-part-ii-smb-exploit-worm-component\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"WanaCrypt0r Analysis Part II &#8211; SMB Exploit and Worm Component"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c","name":"PC Matic Malware Research","url":"https:\/\/www.pcmatic.com\/blog\/author\/pc-matic-malware-research\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57131"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57131\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/57069"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}