Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat towards organisations, there is very little information outlining how ransomware affects Windows Server environments, and particularly its proprietary domain services such as Active Directory. Hence, we aim to increase the cyber situational awareness of organisations and corporations that utilise these environments. Dynamic analysis was performed using three ransomware variants to uncover how crypto-ransomware affects Windows Server-specific services and processes. Our work outlines the practical investigation undertaken as WannaCry, TeslaCrypt, and Jigsaw were acquired and tested against several domain services. The findings showed that none of the three variants stopped the processes and decidedly left all domain services untouched. However, although the services remained operational, they became uniquely dysfunctional as ransomware encrypted the files pertaining to those services
翻译:过去十年来,Ransomware已成为一种日益流行的恶意软件,由于利润高,其受欢迎程度继续上升。 组织和企业已成为赎金软件的主要目标,因为它们更有可能屈服于赎金需求,作为应付停机成本的业务费用的一部分。 尽管赎金软件对组织构成威胁,但很少有资料概述赎金软件如何影响Windows服务器环境,特别是其专用域域服务,例如活动目录。因此,我们的目标是提高利用这些环境的组织和公司对网络形势的认识。利用三种赎金软件变异软件进行了动态分析,以发现加密软件如何影响视窗服务器特定服务和流程。我们的工作概述了以WanCry、TeslaCrypt和Jigsaw等公司为对象进行的实际调查,并针对若干域服务进行了测试。调查结果显示,这三种变种中没有一种软件能够阻止这一过程,并断然使所有域服务都保持中立状态。然而,尽管这些服务仍然在运作,但它们变得独特的功能失调,因为赎金软件加密了与这些服务有关的文件。