Windows XP crashed too much to spread WannaCrypt

What a time to be alive: the BSOD has become a useful feature

By Richard Chirgwin

Posted in Security, 31st May 2017 07:00 GMT

Yes, WannaCrypt can infect all those machines that still run Windows XP, but because XP is so flaky the zombie boxen are unlikely to have contributed much to the spread of the worm.

That's the conclusion of Kryptos Logic researchers after a couple of weeks trashing crash-test-dummy machines in the laboratory.

The company notes that the infection rate probably got up to as many as 727,000 unique IPs at its height.

Early in the infection, it was assumed – including by El Reg – that unpatched Windows XP systems were part of the problem, especially since it lives on in the systems of early victim, England's National Health Service.

Kryptos (whose roster includes celebrated sink-holer MalwareTech) has bumped its head on this for an almost-comical reason: yes, WannyCrypt could infect XP machines, but the underlying DOUBLEPULSAR payload kept crashing the targets.

It's well down the scrollbar in this extensive analysis of WannaCrypt:

The researchers were running through the infection step-by-step: first, manually execute the WannaCrypt binary on a Windows 2008 Server SP1 machine; second, test propagation via the ETERNALBLUE exploit; and third, send the payload on using DOUBLEPULSAR.

Here's the short version:

  • Windows XP with Service Pack 2 – No infection
  • Windows XP with Service Pack 3 – Random blue-screen of death (BSOD) but no infection
  • Windows 7 64 bit with Service Pack 1 – Infected after multiple attempts
  • Windows Server 2008 with Service Pack 1 – Could not replicate infection, but reported exploited

The WannaCrypt infection process, according to Kryptos. Click to embiggen

Next, the Kryptos chaps went to work on manually backdooring test systems with DOUBLEPULSAR. While that worked just fine on Windows 7 64-bit, SP1, “it was found that both Windows XP hosts kept blue-screening and rebooting without any infection occurring.”

It doesn't mean that XP was mysteriously protected by its love of BSOD – if you got a user to manually execute it locally, it would encrypt the victim's files.

However, Kryptos writes, XP probably didn't contribute much to the number of infected machines, “since the main infection vector was the SME exploit” because “the exploit as implemented in WannaCry does not seem to reliably deploy DOUBLEPULSAR and achieve proper RCE.”

Mind you, getting a cycle of BSODs would spoil anyone's day. ®

Sign up to our NewsletterGet IT in your inbox daily

41 Comments

More from The Register

Cisco can now sniff out malware inside encrypted traffic

This is Switchzilla’s kit-plus-cloud plan in action

Microsoft emergency update: Malware Engine needs, erm, malware protection

Stop appreciating the irony and go install the patch now

Microsoft patched more Malware Protection Engine bugs last week

Redmond's out-of-band advisory landed after the bugs were fixed

Fella faked Cisco, Microsoft gear death – then sold replacement kit for millions, say Feds

'Phony photos', legit serial numbers land chap in court

Cisco to trial direct online sales

Australia the 'vanguard', perhaps with new smallbiz products to make it sensible

Laggard Cisco stumbles over, puffing: 'HyperFlex now supports Hyper-V'

Version 3.0 scales up, shows some container love and promises validation

Sigh. Cisco security kit has Java deserialisation bug and a default password SNAFU

Two critical vulnerabilities among 20 patches

Judges dismisses majority of Cisco's 'insane' IP defence against Arista

Switch antitrust case rumbles on

Cisco's 'encrypted traffic fingerprinting' turned into a product

Borg's boxen can now figure out if there's malware lurking in encrypted traffic

Cisco to release patches for Meltdown, Spectre CPU vulns, just in case

Switchzilla is investigating a whole bunch of products