Cyber Security Incident Response Wannacry Ransomware
- Description
- Curriculum
- FAQ
- Reviews
Wannacry has been one of the most famous ransomware in computer history (so far) which allows us to investigate how it worked and identify indicators of compromise. The goal of the course is not to protect against Wannacry, but to provide you with a methodology to be able to quickly assess the behavour of a suspicious application in a computer. The tools we are using in this course are free for personal use, but there are way more other solutions you can use for the same purpose.
At the end of this training you will have a solid understanding how the ransomware works and how to protect you environment, also you will be able to use the tools to identify and analyse other malicious tools. You will not be a malware analyst, this is not the course for that. This course will give you the steps to be able to do incident response in a quick manner and see what areas you need to develop yourself using other courses. Deep malware analysis is a very interesting area, but not necessarily the part of the incident response team. There are companies specialized in malware analysis, or people specializing in malware analysis. One can spend hours, days, weeks, months analyzing a single malware. This course aims for quick response.
-
101.01 IntroductionVideo lesson
Introduction to the training and the instructor.
-
201.02 What is Wannacry?Video lesson
Short introduction to the Wannacry ransomware and it's impact.
-
301.03 ScenarioVideo lesson
Introduction to our scenario we will walk through in the training.
-
401.04 Supporting MaterialsText lesson
Please see the supporting material attached. Download this before proceeding to the next section.
The info.txt has most of the links and commands you might need to use during the course.
The zip file contains the evidences and supporting material including the presentation. Password is: "wannacry".
-
803.01 GoalsVideo lesson
Introduction to the section.
-
903.02 Getting the tools: Windows 7 installer ISO imageVideo lesson
Downloading the Windows 7 installer ISO.
-
1003.03 Installing Windows 7Video lesson
Installing Windows 7 in the lab environment.
-
1103.04 Disabling Windows security featuresVideo lesson
Disabling some features in Windows to enable Wannacry to infect.
-
1203.05 Configuring shared foldersVideo lesson
Configure shared folders for file transfer and tool install.
-
1605.01 GoalsVideo lesson
Introduction to the section.
-
1705.02 Getting the tools: Wannacry samples Ghidra and network-traffic-analysisVideo lesson
Getting the Wannacry malware sample from multiple sources.
-
1805.03 Configuring the lab machines W10up, W7up, networkVideo lesson
Making sure the lab environment is ready to be infected with Wannacry.
-
1905.04 Infecting the Windows 10 with WannacryVideo lesson
Infect the Windows 10 with Wannacry.
-
2006.01 GoalsVideo lesson
Introduction to the section.
-
2106.02 Getting the tools: memory capture tool WinPMEMVideo lesson
Downloading the tools for taking a memory image.
-
2206.03 Taking a memory imageVideo lesson
Taking a memory snapshot.
-
2306.04 Getting the tools: disk capture tool AccessData FTK liteVideo lesson
Downloading the disk imaging tool.
-
2406.05 Taking a disk imageVideo lesson
Taking a disk image using FTK Imager.
-
2506.06 Getting the tools: SysinternalsVideo lesson
Downloading the Microsoft Sysinternals Suite.
-
2606.07 Live assessment: network, processes, services, autorunsVideo lesson
Quick analysis of the Windows 10 machine. Network connections, processes, services, autoruns.
-
2707.01 GoalsVideo lesson
Introduction to the section.
-
2807.02 Gathering system informationVideo lesson
Gathering system information for the report.
-
2907.03 File and Process information #1Video lesson
Windows 10 analysis file and process information #1.
-
3007.04 File and Process information #2Video lesson
Windows 10 analysis file and process information #2.
-
3107.05 File and Process information #3Video lesson
Windows 10 analysis file and process information #3.
-
3207.06 AutorunsVideo lesson
Autoruns analysis.
-
3307.07 Getting the tools: hexa editor HxDVideo lesson
Downloading a hex editor.
-
3407.08 Using HxDVideo lesson
Analysis using a hex editor HxD.
-
3507.09 Getting the tools: static exe analysis: Exeinfo, PeiD, PEStudio, x64dbgVideo lesson
Downloading the tools for static exe file information extraction.
-
3607.10 Exe analysis – exinfo, PeiD, pestudioVideo lesson
Static exe file analysis.
-
3707.11 Getting the password for the embedded ZIP fileVideo lesson
Getting the password for the embedded payload in the Wannacry executable.
-
3807.12 Getting the tools: Registry tools WRR and Registry ExplorerVideo lesson
Downloading Registry editing tools.
-
3907.13 Using Registry toolsVideo lesson
Analysing the registry using the registry explorer tools.
-
4008.01 GoalsVideo lesson
Introduction to the section.
-
4108.02 Getting the tools: Wireshark, RegShotVideo lesson
Downloading network capturing and registry snapshot tools.
-
4208.03 Preparing the lab machines and toolsVideo lesson
Preparing the lab for the sandbox analysis.
-
4308.04 Monitor and execute the malwareVideo lesson
Executing Wannacry in the lab and capturing the activity.
-
4408.05 Preparing for analyzing the resultsVideo lesson
Prepare the sandbox analysis results for analysis.
-
4508.06 Analyzing Network traffic captureVideo lesson
Analysing network traffic capture.
-
4608.07 Analyzing Procmon resultsVideo lesson
Analysing procmon capture.
-
4708.08 Analyzing Regshot resultsVideo lesson
Analysing registry changes.
-
4808.09 Getting the tool and configure RedlineVideo lesson
Using Redline automated forensics tool to capture the system activity.
-
4908.10 Analyzing using RedlineVideo lesson
Analysing Redline capture.
-
5008.11 Download tools: fakenetVideo lesson
Download fakenet networking tool.
-
5108.12 Analyzing the killswitch domainVideo lesson
Analysing the killswitch domain in the network traffic.
-
5208.13 Analyzing one more fileVideo lesson
Analysing one more executable in the Windows 7.
External Links May Contain Affiliate Links read more