{"id":1160,"date":"2017-05-19T23:06:15","date_gmt":"2017-05-19T23:06:15","guid":{"rendered":"https:\/\/www.technology-solved.com\/huntsville-al\/?p=1160"},"modified":"2022-02-02T21:42:13","modified_gmt":"2022-02-02T21:42:13","slug":"wannadecrypt-files-wannacry-solution","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/","title":{"rendered":"WannaDecrypt your files? The WannaCry solution, for some"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1165\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/shutterstock_82383349-900x506.jpg\" alt=\"Open Encrypted File\" width=\"300\" height=\"169\" \/><\/p>\n<p>Posted: May 19, 2017 by Adam Kujawa<\/p>\n<p>We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for WannaCry\/WannaCrypt\/wCrypt. There is a catch though, it only works for the following operating systems:<\/p>\n<p>Windows XP<br \/>\nWindows Server 2003<br \/>\nWindows Vista<br \/>\nWindows Server 2008<br \/>\nWindows Server 2008 R2<br \/>\nWindows 7<br \/>\nSo if you\u2019ve got a WannaCry infection on one of the above operating systems, there is hope!<\/p>\n<p>IMPORTANT:<\/p>\n<p>The decryptor is only going to work if you haven\u2019t restarted the infected system and you haven\u2019t killed the ransomware process (should be wnry.exe or wcry.exe) so please don\u2019t restart or kill the process if you want to get those files back!<\/p>\n<p>Usage<\/p>\n<p>In order to use this tool, you first need to download it from here.<\/p>\n<p>This tool essentially searches the system\u2019s memory for prime numbers and pieces together the encryption key used. However, it relies on current running memory so once you reboot it will be gone and if you\u2019ve done too much on the system since infection, it\u2019s possible the key won\u2019t be found (because it\u2019s been overwritten by data from other applications using the same memory space).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1149\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/170513090706-ransomware-attack-china-780x439.jpg\" alt=\"\" width=\"300\" height=\"169\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1161\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/CMDAdmin.png\" alt=\"CMD\" width=\"300\" height=\"150\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1164\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png\" alt=\"PID\" width=\"300\" height=\"122\" \/><\/p>\n<p>To run it, download the linked file (above) and extract the .zip to a folder on your desktop, (if you can download the file from a clean system and then transfer it via USB, you run less risk of overwriting the key in memory).<\/p>\n<p>Next, you can either double click it (boring) or open the command prompt (Start + CMD) and run it through there (fun!).<\/p>\n<p>The tool will automatically identify the WannaCrypt applications running on the system if they are called wnry.exe or wcry.exe, but if for some reason they can\u2019t find them, maybe check out the running applications on your system (Task Manager\/Process Explorer) and find the offender (it\u2019s pretty obvious), then identify the Process Identification Number (PID) and you can just plug that into the command prompt after wanakiwi.exe.<\/p>\n<p>It might take a few minutes for the tool to find the key (or many minutes in some cases), but once it\u2019s found the tool is going to start searching your system for encrypted files and decrypt them automatically.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1163\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/DecryptionInProgres.png\" alt=\"Decryption In Progres\" width=\"300\" height=\"132\" \/><\/p>\n<p>After the tool finishes decrypting your files, you are going to be left with a ransom note as a background and lots of encrypted files next to your unencrypted files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1162\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/DecryptedPics.png\" alt=\"Decrypted Pics\" width=\"300\" height=\"251\" \/><\/p>\n<p>Here are some possible next steps:<\/p>\n<p>Download Malwarebytes 3.0 (or whatever scanning tool you prefer that can clean up WannaCry) and run a scan on the system to identify all artifacts related to WannaCry. This will help you get the malware off the system in case it tries to encrypt again.<br \/>\nRestart the computer to finish clean-up.<br \/>\nFind all the most important files you want to keep and move them to some form of backup.<br \/>\nWipe the system and reinstall Windows.<br \/>\nOR you can just go through your system looking for all files with the .WNCRY extension and getting rid of them.<br \/>\nBackground<\/p>\n<p>The original memory scrubbing, prime number searching WannaKey decryptor tool (for XP) was written by Adrien Guinet (@adriengnt) and then used as the base for Wanakiwi developed by Benjamin Delpy (@gentilkiwi). These guys are incredibly talented and deserve a round of applause!<\/p>\n<p>We found out about the tool thanks to the very extensive blog post by Matt Suiche (@msuiche), which you should check out to get more information about how these tools work. You might remember Matt from his assistance in stopping a variant of the WannaCry released last week by registering the killswitch domain.<\/p>\n<p>Effectiveness<\/p>\n<p>We didn\u2019t want to write about this tool until we tested it in some capacity. A lot of other security researchers have given it a go and it seems that the tool works well in lab environments (sometimes). I personally tested it on a Windows 7 system using the following sample (with mixed results):<\/p>\n<p>ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa<\/p>\n<p>My first test worked like a charm.<br \/>\nMy second test with a new profile (for taking screenshots for this post) couldn\u2019t actually launch the malware.<br \/>\nMy third test launched the malware, but the decryptor took forever and eventually never found the key.<br \/>\nMy fourth test worked like a charm again (original profile).<br \/>\nSome of our other researchers tried it and were unable to get the tool to find the key.<br \/>\nConclusion<\/p>\n<p>This tool was put together very quickly and it\u2019s meant to help those that it can help and that is likely not everybody. I wouldn\u2019t recommend putting all your eggs in the basket that if you get hit, you couldn\u2019t decrypt using this tool because either:<\/p>\n<p>You are likely going to be unable to recover the key OR<br \/>\nThe malware will modify to clean up the running memory or force a reboot after install to make the tool ineffective<br \/>\nBut if you are currently dealing with a WannaCry infection, you have barely touched the infected system(s), and you are running one of the operating systems listed at the beginning of this post, running the tool is not going to break anything that isn\u2019t already broken so it\u2019s worth a shot just to see if you can get those files back.<\/p>\n<p>That being said, once again big thanks to @adriengnt, @gentilkiwi &amp; @msuiche for their hard work, information spreading and ingenious development skills.<\/p>\n<p>Let us know in the comments if this tool worked for you (and your configuration too!)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for WannaCry\/WannaCrypt\/wCrypt. There is a catch though, it only works for the following operating systems: Windows XP Windows Server 2003 Windows Vista Windows Server 2008 Windows [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":1881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville<\/title>\n<meta name=\"description\" content=\"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville\" \/>\n<meta property=\"og:description\" content=\"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Huntsville\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-19T23:06:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-02T21:42:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png\" \/>\n\t<meta property=\"og:image:width\" content=\"790\" \/>\n\t<meta property=\"og:image:height\" content=\"322\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cthuntsville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cthuntsville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/\",\"name\":\"WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville\",\"isPartOf\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png\",\"datePublished\":\"2017-05-19T23:06:15+00:00\",\"dateModified\":\"2022-02-02T21:42:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\"},\"description\":\"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png\",\"contentUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png\",\"width\":790,\"height\":322,\"caption\":\"PID\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\/\/www.technology-solved.com\/locations\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alabama\",\"item\":\"https:\/\/www.technology-solved.com\/alabama-state\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"WannaDecrypt your files? The WannaCry solution, for some\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\",\"name\":\"Computer Troubleshooters Huntsville\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\",\"name\":\"cthuntsville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"caption\":\"cthuntsville\"},\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville","description":"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/","og_locale":"en_US","og_type":"article","og_title":"WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville","og_description":"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for","og_url":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/","og_site_name":"Computer Troubleshooters Huntsville","article_published_time":"2017-05-19T23:06:15+00:00","article_modified_time":"2022-02-02T21:42:13+00:00","og_image":[{"width":790,"height":322,"url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png","type":"image\/png"}],"author":"cthuntsville","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cthuntsville","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/","url":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/","name":"WannaDecrypt your files? The WannaCry solution, for some - Computer Troubleshooters Huntsville","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png","datePublished":"2017-05-19T23:06:15+00:00","dateModified":"2022-02-02T21:42:13+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"description":"Posted: May 19, 2017 by Adam Kujawa We just wanted to shoot out a quick blog post to let you know about a decryptor (Wanakiwi) that has been developed for","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#primaryimage","url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png","contentUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/PID.png","width":790,"height":322,"caption":"PID"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/wannadecrypt-files-wannacry-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Alabama","item":"https:\/\/www.technology-solved.com\/alabama-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/huntsville-al\/"},{"@type":"ListItem","position":4,"name":"WannaDecrypt your files? The WannaCry solution, for some"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website","url":"https:\/\/www.technology-solved.com\/huntsville-al\/","name":"Computer Troubleshooters Huntsville","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90","name":"cthuntsville","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","caption":"cthuntsville"},"url":"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/comments?post=1160"}],"version-history":[{"count":7,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1160\/revisions"}],"predecessor-version":[{"id":2389,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1160\/revisions\/2389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media\/1881"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media?parent=1160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/categories?post=1160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/tags?post=1160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}