Windows Defender ATP - Ransomware Response Playbook
Windows Defender ATP - Ransomware Response Playbook
Windows Defender ATP - Ransomware Response Playbook
Page 1 of 19
Windows Defender ATP - Ransomware response playbook
Page 2 of 19
Windows Defender ATP - Ransomware response playbook
Contents
Overview ........................................................................................................................................................... 4
1. Discover ransomware and mitigate ....................................................................................................... 5
1.1. Threats that evade email filters and endpoint antimalware................................................................. 5
4.2. Protecting from ransomware that arrive through web browsers ................................................... 14
7. References................................................................................................................................................... 19
Page 3 of 19
Windows Defender ATP - Ransomware response playbook
Overview
Ransomware is a menace that affects both home users and large enterprises,
including organizations in various industries. If left unabated, ransomware attacks can
result in significant losses for its victims. Ransomware attacks have also provided a
revenue stream for cybercriminals, who are likely to leverage these resources as well
as the experience of running malicious campaigns to pursue other criminal activities,
particularly cyberespionage.
Page 4 of 19
Windows Defender ATP - Ransomware response playbook
In cases where ransomware manages to evade email filters and endpoint antimalware,
it would be reasonable to expect end-users to report cases of ransomware infection.
However, employees might hesitate to report a ransomware attack or might delay
reporting. Thus, the threat could remain active, leaving the network vulnerable.
Windows Defender ATP detects all kinds of threat and breach activity, including
ransomware activity. It automatically raises alerts to help ensure that SecOps
personnel are aware of ransomware infections and can respond accordingly. In our
real-world Cerber case, Windows Defender ATP raised several alerts, indicating how
each alert maps to an infection stage shown in the red boxes below.
Page 5 of 19
Windows Defender ATP - Ransomware response playbook
Although most ransomware are not known to move laterally, it is good practice to
isolate affected machines from the network as soon as a ransomware infection or the
presence of any other threat is suspected. Isolating affected machines also helps
prevent ransomware from encrypting data on shared folders and mapped drives.
Page 6 of 19
Windows Defender ATP - Ransomware response playbook
2. The email has a .zip attachment, and the text inside the email body encourages
the user to open the attachment.
3. Once the user extracts the contents of the .zip archive —typically a .docm, .js,
.vbs, .lnk or .swf file is extracted—and opens the extracted file, the file
downloads and runs an .exe or .dll file containing the ransomware payload.
• User visits a website, triggering an exploit that downloads and runs the
ransomware payload. Many of these exploits target outdated browser versions
typically active in older versions of Windows.
Page 7 of 19
Windows Defender ATP - Ransomware response playbook
Most advanced threats are polymorphic and actively modify themselves during
infection to bypass antimalware and other protection layers deployed in enterprises.
By focusing on generic behavioral patterns across a threat’s lifecycle and across
machines within organizations, Windows Defender ATP can help identify threats that
are otherwise able to avoid traditional security solutions.
Our Cerber sample uses cmd.exe to run malicious commands using Powershell.exe.
Behavioral detection in Windows Defender ATP recognizes this PowerShell activity as
malicious and triggers an alert.
When we check the Windows Defender ATP console to investigate the network
connection made by our Cerber ransomware sample, we clearly see how the
ransomware used PowerShell to communicate with a command and control (C&C)
address through a TOR anonymization service.
The timeline in the Windows Defender ATP console shows that the PowerShell
command originated from Microsoft Word, which is unexpected behavior for most
documents.
Page 8 of 19
Windows Defender ATP - Ransomware response playbook
Now that it is known that the ransomware came from a Word document—most likely
macros were enabled since the document was able to run a process—the next steps
would be to look for a file creation event wherein a .doc or .docm file was created and
to check which process created the file.
• An email client
• A web browser
Identifying the infection source can be done in the Windows Defender ATP console by
investigating the alert process tree.
Apart from arriving via a macro-enabled Word (.docm) or Excel file (.xlsm),
ransomware can also be downloaded by link (.lnk), JavaScript (.js) or VB script (.vbs)
files. Locating any of these files and tracing how they reached the infected machine
can help uncover the ransomware delivery mechanism.
Page 9 of 19
Windows Defender ATP - Ransomware response playbook
With the payload file apparent from the alerts, the next thing to look for would be any
network connections made before the payload file appeared on the machine.
To introduce the payload file to the victim’s machine—in this context, the second
stage payload is an .exe or .dll file—our Cerber sample opened a suspicious network
connection through TOR and downloaded the payload file.
Using the process tree view on Windows Defender ATP, you can spot the connection
between the suspicious PowerShell command line alert and the TOR communication
alert. You can also see invaluable information about other artifacts, such as the IP
address, domain, or URL involved in the communication.
Figure 4. Full process tree showing the PowerShell command, the TOR connection, and
the IP address
Page 10 of 19
Windows Defender ATP - Ransomware response playbook
If you have been notified about the ransomware infection by a user or another
solution, you can still go in the Windows Defender ATP console to check the timeline
of the affected machine for:
• Any suspicious executables that have run on the affected machine; consider all
available information to identify suspicious files, including prevalence and
signer information, which are provided by Windows Defender ATP. To better
understand file behavior, submit files for deep analysis.
• The file associated with the process that triggered the creation of the suspicious
executable
In general, if no alerts have been triggered on Windows Defender ATP for a verified
infection, notify Microsoft immediately through Premier Support, which is accessible
via the Windows Defender ATP help (?) menu. Notifying Microsoft helps us enhance
detection of verified threats and their variants.
Page 11 of 19
Windows Defender ATP - Ransomware response playbook
To perform the techniques described below, you can leverage Windows Defender
ATP search. In the search bar, specify the type of artifact you want to locate: file, IP
address, URL, machine name, or user.
3.1. Searching for the executable file using the process SHA-1
By searching for the SHA-1 of the suspect process, you can identify all other machines
that have the same file and are likely also affected by the threat.
For our Cerber case, the file SHA-1 is quite rare, not being known to VirusTotal and
having a global prevalence score of one. This rarity strongly indicates that the file is
indeed malicious and very likely polymorphic.
Page 12 of 19
Windows Defender ATP - Ransomware response playbook
Figure 6. Windows Defender ATP showing SHA-1 prevalence and VirusTotal detections
If the payload file is polymorphic, its SHA-1 will not be the same across its copies. By
searching for the file by name instead of SHA-1, you may be able to find other
affected machines. In the screenshot below, the Cerber payload file was found on
multiple machines with the same filename but different SHA-1s.
If you have identified a network address that the ransomware has connected to,
search for the URL or IP address to identify similar connections from other machines
on the network. Machines that have connected to the same address are likely affected
by the same threat.
Page 13 of 19
Windows Defender ATP - Ransomware response playbook
If the threat arrived by email, consider the following preventive actions on your mail
product. Office 365 provides powerful features that allow you to:
• Check the email header for a unique X-Mailer or sender IP address information
and add message transport rules
• Remind end-users to move the attack email to the “junk” folder and report
spam or malicious emails in Microsoft Office Outlook or Outlook on the web
Protect your email in real time against unknown and sophisticated attacks with Office
365 Advanced Threat Protection (Office 365 ATP). Office 365 ATP helps stop attacks
by removing unsafe attachments and replacing unsafe links. It also provides message
tracing, so you can investigate attack messages and track clicks on malicious links.
If the threat arrived from a malicious or compromised website, consider the following
preventive actions:
o Block the site IP address using Windows Firewall or the network firewall.
Page 14 of 19
Windows Defender ATP - Ransomware response playbook
• Ensure that web browsers used in the enterprise have the latest security
updates.
In addition to improving user awareness and requiring the use of secure browsers, the
following actions can help enhance protection on individual machines:
Page 15 of 19
Windows Defender ATP - Ransomware response playbook
After the affected machine has been rebuilt, ensure that the machine is well-
protected. Refer to the recommendations in 4.3. Enhancing other endpoint defenses.
Page 16 of 19
Windows Defender ATP - Ransomware response playbook
1. Take the machine fully off the network. Do not allow the machine to be used
unless for investigation.
4. Look for other affected machines on the network by checking for the same file
names or SHA-1s. Check for connections to the same malicious network
addresses.
5. Find any infection vectors, whether email, IP address, or URL, and block these
infection sources.
7. Rebuild the affected machine. Recover data from backups generated before
the infection.
Page 17 of 19
Windows Defender ATP - Ransomware response playbook
process and enables responders to perform critical investigative and response tasks
efficiently from a central console.
Page 18 of 19
Windows Defender ATP - Ransomware response playbook
7. References
For more information about how you can defend against ransomware, see the
following resources:
Page 19 of 19