rexor wrote:EP_X0FF - can you suggest/point to the sample/version of Urausy family that comes as closely as possible to what the author writes?
According to their article "content" they have analyzed Urausy.C and/or Urausy.D
Startup sequence: dropper->decrypt loader in mem, overwrite EP with decrypted mem->flow control to it->map ntdll.dll and patch NtClose to the shellcode->open Explorer.exe with NtOpenProcess (CLIEND_ID = VirtualAlloc(PAGE_READWRITE+PAGE_GUARD))->unmap ntdll.dll and replace it with modified->dropper terminate->Explorer.exe->malware gets control when NtClose called->restore hooked NtClose->new svchost.exe with injected payload shellcode->CreateDesktop->SwitchDesktop->display ransom page.
For samples see this thread http://www.kernelmode.info/forum/viewto ... =16&t=2135
And from there they copy-pasted most of info http://blog.avast.com/2013/07/24/urausy ... 0-minutes/
But of course it was SentinelLabs reinvention not plagiarism -> "It took me hours, days to understand this" (C).
Ring0 - the source of inspiration