cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3166
Views
3
Helpful
6
Replies

AMP for endpoint can't block the packered WannaCry.

Tsunoda
Level 1
Level 1

AMP for endpoint seems to be not able to block the wannacry which is encrypted with packer tool.

Are there any workaround?

Repro-steps:

1. get a wannacry from ThreatGrid or any other service

1.png

2. encrypt it with packer tool such as upx

2.png

3. open AMP console and enable TETRA feature.

3.png

4. Install the Connector.

5. Scan the wannacry with AMP for endpoint. It is judged as no problem.

6. Run the wannacry. It works. Some programs such as WannaDecrypter are blocked. But encryption of user data complete.

4.png

1 Accepted Solution

Accepted Solutions

Hi Takahiro,

Thank you for sharing further details of your testing. Did you see a Cloud IOC fire in the AMP Console? I would expect that to happen as the minimum and in a realistic scenario, the infection could be prevented by one of the "new" engines, that are a part of this connector version. For real-time ransomware blocking, there's going to be a beta of one more component available soon, that is highly effective at addressing the problem of ransomware generically (file encryption behavior observed, initiating process blocked; with an ability to exclude benign processes). A notification about the Beta will be posted to the AMP Console and you would receive an email notification if that's enabled on your console.

View solution in original post

6 Replies 6

emirolyu
Cisco Employee
Cisco Employee

Hello Takahiro Tsunoda,

Thank you for your screenshots and the repro-steps.

What version of the AMP for Endpoints connector are you running in this testing?

Hi Evgeny,

Thank you for your reply.

The version of connector I tested is 6.0.7.10670.

Best regards,

Takahiro

Hi Takahiro,

Thank you for sharing further details of your testing. Did you see a Cloud IOC fire in the AMP Console? I would expect that to happen as the minimum and in a realistic scenario, the infection could be prevented by one of the "new" engines, that are a part of this connector version. For real-time ransomware blocking, there's going to be a beta of one more component available soon, that is highly effective at addressing the problem of ransomware generically (file encryption behavior observed, initiating process blocked; with an ability to exclude benign processes). A notification about the Beta will be posted to the AMP Console and you would receive an email notification if that's enabled on your console.

Hi Evgeny,

I checked the trajectry. IOC have been fired. But wannacry main file was not quarantined.

I was not able to find the information about beta. How can I use it?

trajectry.png

Hi Takahiro,

Apologies for the delay to respond. You can enroll in the Beta program using your AMP for Endpoints console by navigating to Management > Beta > Enroll.

Thank you for your answer. My question was cleared.