{"id":11013,"date":"2015-11-17T05:00:14","date_gmt":"2015-11-17T13:00:14","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11013"},"modified":"2015-11-16T15:36:44","modified_gmt":"2015-11-16T23:36:44","slug":"network-shared-drive-encrypted-by-cryptowall-how-to-track-down-the-infected-pc","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/11\/network-shared-drive-encrypted-by-cryptowall-how-to-track-down-the-infected-pc\/","title":{"rendered":"Network Shared Drive Encrypted by CryptoWall? How to Track Down the Infected PC"},"content":{"rendered":"<p>There is a lot of information on the web about preventing and recovering from CryptoWall or ransomware attacks in enterprise environments, but most don\u2019t answer this basic question:<\/p>\n<p>\u201c<em>How do I determine which CryptoWall-infected PC encrypted all the documents in one of my network-shared drives? I don\u2019t have audit logging enabled on my file server.<\/em>\u201d<\/p>\n<p>Although many organizations are working on migrating their document storage to the cloud, most still rely upon individual Microsoft network shares as a document repository for each business department. For example, the financial controller\u2019s office may have a network share dedicated to that department, the HR department has a different one, etc. When a user\u2019s PC in one of these departments becomes infected by CryptoWall, the ransomware iterates through <em>all files<\/em> on <em>all folders<\/em> on <em>all local and mapped network drives<\/em> and encrypts certain file types that the user has permissions to modify.<\/p>\n<p>As a security lead for a hospital network, I created the following CryptoWall response plan specifically to deal with impacted department shared drives:<!--more--><\/p>\n<ol>\n<li>Identify the user account that modified (encrypted) the shared drive files.<\/li>\n<li>Identify the infected PC and restrict network access.<\/li>\n<li>Create inventory of all network share directories impacted.<\/li>\n<li>Restore impacted directories from backup.<\/li>\n<\/ol>\n<p>Identifying the user account in Step 1 can be challenging if you don\u2019t know where to look. The best way to identify the user account used to encrypt the files is to examine the \u201cowner\u201d attribute of one of the instruction files created by the ransomware. Here are the steps to identify the owner:<\/p>\n<p>1. Right click on the instructions file (i.e., HELP_DECRYPT.txt) created by the ransomware on the network share, and select Properties.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1.png\"><div style=\"max-width:100%\" data-width=\"412\"><span class=\"ar-custom\" style=\"padding-bottom:80.83%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-11014 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1.png\" alt=\"cryptowall matt 1\" width=\"412\" height=\"333\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1.png 412w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1-230x186.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1-371x300.png 371w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-1-49x40.png 49w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/span><\/div><\/a><\/p>\n<p>2.\u00a0Select the <em>Security<\/em> tab --&gt;\u00a0<em>Advanced\u00a0<\/em>--&gt;\u00a0<em>Owner,<\/em> and view the <em>Current Owner attribute<\/em>. The Current Owner attribute is likely the username used to encrypt the files in the directory.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2.png\"><div style=\"max-width:100%\" data-width=\"413\"><span class=\"ar-custom\" style=\"padding-bottom:121.31%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-11015 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2.png\" alt=\"cryptowall matt 2\" width=\"413\" height=\"501\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2.png 413w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2-230x279.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2-247x300.png 247w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-2-33x40.png 33w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/span><\/div><\/a> <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:70.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11016 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3-500x354.png\" alt=\"cryptowall matt 3\" width=\"500\" height=\"354\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3-500x354.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3-230x163.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3-423x300.png 423w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3-56x40.png 56w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/cryptowall-matt-3.png 567w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Once you know the username used to encrypt the files, you can reset the user\u2019s password, attempt to contact the person, and identify the user\u2019s assigned PC in order to block it on the network. Once the PC is blocked, the server team can then identify the impacted directories on the network share (Tip: Use PowerScript to identify directories containing the instructions file). Finally, the Backup team can restore the files in all of the identified directories.<\/p>\n<p>For more information on the latest CryptoWall threat, take a look at a <a href=\"http:\/\/cyberthreatalliance.org\/cryptowall-report.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">detailed analysis of CryptoWall v3<\/a> authored by the <a href=\"http:\/\/cyberthreatalliance.org\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Threat Alliance<\/a>, cofounded by Palo Alto Networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a lot of information on the web about preventing and recovering from CryptoWall or ransomware attacks in enterprise environments, but most don\u2019t answer this basic question: \u201cHow do I determine &hellip;<\/p>\n","protected":false},"author":142,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,131],"tags":[220,834,662,221],"coauthors":[1355],"class_list":["post-11013","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-malware-2","tag-cryptolocker","tag-cryptowall","tag-cyber-threat-alliance","tag-ransomware"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/142"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11013"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11013\/revisions"}],"predecessor-version":[{"id":11019,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11013\/revisions\/11019"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11013"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}