{"id":84308,"date":"2017-05-23T17:00:45","date_gmt":"2017-05-23T11:30:45","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84308"},"modified":"2017-05-23T17:08:33","modified_gmt":"2017-05-23T11:38:33","slug":"pdf-files-embedded-docm-files-now-deliver-jaff-ransomware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/pdf-files-embedded-docm-files-now-deliver-jaff-ransomware\/","title":{"rendered":"PDF files with embedded docm files now deliver Jaff Ransomware"},"content":{"rendered":"<p>Adding to the havoc created by the recent outbreak of the WannaCry Ransomware is a new entry to the list of encrypting ransomware called \u2018Jaff\u2019. Reportedly, this variant has been created by the authors of the Locky ransomware. The source of this ransomware is the Necurs botnet which is using <strong>PDF files with embedded docm <\/strong>to distribute this malware.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wannacry-ransomware-creating-havoc-worldwide-exploiting-patched-windows-exploit\/\">Read more about WannaCry Ransomware<\/a><\/p>\n<p>Although its occurrence was overshadowed by the WannaCry &#8211; known to be the world&#8217;s biggest ransomware attack, the Jaff ransomware has successfully kept its persistence in the wild. In this attack, spam emails are sent to victims that contain <strong>nm.pdf <\/strong><em>[file name then changed to randomNo.pdf in later mails] <\/em>as attachments with embedded docm files.<\/p>\n<p>In earlier incidents, such unprecedented spam campaigns were observed delivering the Dridex Banking malware and then Locky ransomware.<\/p>\n<p><strong><u>How the Jaff ransomware attack happens<\/u><\/strong><\/p>\n<p>1) The targeted victim will receive an email attachment. This may have keywords such as \u2018document\u2019, \u2018copy\u2019, \u2018scan\u2019, etc., in the subject line as shown below.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84309 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1.png\" alt=\"jaff_ransomware_1\" width=\"402\" height=\"388\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1.png 402w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1-300x290.png 300w\" sizes=\"(max-width: 402px) 100vw, 402px\" \/><br \/>\nFig 1<\/p>\n<p>2) In the above screenshot, the attached <strong>nm.pdf<\/strong> contains embedded objects with names such as \u201cU3JPCNQ.docm\u201d, TZLEHYM.docm, etc.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-84310 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1a-650x29.png\" alt=\"jaff_ransomware_1a\" width=\"650\" height=\"29\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1a-650x29.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1a-300x14.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1a-768x35.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_1a.png 773w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/>Fig 2<\/p>\n<p>3) Once the victim opens the PDF file, the system\u2019s Adobe reader will throw a warning message stating that the file contains an attachment which may contain viruses or macro.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84311 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2-650x314.png\" alt=\"jaff_ransomware_2\" width=\"650\" height=\"314\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2-650x314.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2-300x145.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2-768x371.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2-789x381.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_2.png 1010w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\nFig 3<\/p>\n<p>4) If the user selects \u2018Open this file\u2019, the docm file with \u2018enable content\u2019 option will get open.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84312 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-391x390.png\" alt=\"jaff_ransomware_3\" width=\"391\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-391x390.png 391w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-300x300.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_3.png 456w\" sizes=\"(max-width: 391px) 100vw, 391px\" \/><br \/>\nFig 4<\/p>\n<p>5) Once the macro is enabled, it tries to communicate with hosts stored in an array as shown below (fig 4). It will try to communicate with the hosts one by one. And if it gets any response from any host, it will download malicious content and infect the system with the Jaff ransomware. Otherwise, it will try to connect to the other hosts until it gets any response.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84313 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b-650x26.png\" alt=\"jaff_ransomware_4b\" width=\"650\" height=\"26\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b-650x26.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b-300x12.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b-768x30.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b-789x31.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4b.png 934w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84314 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a-650x25.png\" alt=\"jaff_ransomware_4a\" width=\"650\" height=\"25\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a-650x25.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a-300x11.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a-768x29.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a-789x30.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_4a.png 1108w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\nFig 5<\/p>\n<p><strong>Command and control server communication<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84315 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_5-642x390.png\" alt=\"jaff_ransomware_5\" width=\"642\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_5-642x390.png 642w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_5-300x182.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_5.png 759w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/p>\n<p style=\"text-align: center\">Fig 6<\/p>\n<p>6) The downloaded malicious executable starts encrypting the files stored on the victim\u2019s computer with AES encryption, and appends \u2018.JAFF\u2019 extension to these files before displaying a ransomware note as shown below. Reportedly, Jaff demands a ransom of $3,300 which is 10 times as much as the ransom demanded by WannaCry ransomware &#8211; $300.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84317 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a-650x176.png\" alt=\"jaff_ransomware_6a\" width=\"650\" height=\"176\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a-650x176.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a-300x81.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a-768x209.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a-789x214.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6a.png 884w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\nFig 7<\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-84316 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6-650x361.png\" alt=\"jaff_ransomware_6\" width=\"650\" height=\"361\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6-650x361.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6-300x167.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6-768x427.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6-789x439.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_6.png 1590w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center\">Fig 8<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84318 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_7.png\" alt=\"jaff_ransomware_7\" width=\"271\" height=\"160\" \/><br \/>\nFig 9<\/p>\n<p>Currently, files encrypted by the Jaff ransomware cannot be decrypted.<\/p>\n<p><strong>Malicious URLs observed<\/strong><\/p>\n<ul>\n<li>hxxp:\/\/easysupport.us\/f87346b<\/li>\n<li>hxxp:\/\/wipersdirect.com\/f87346b<\/li>\n<li>hxxp:\/\/phinamco.com\/f87346b<\/li>\n<li>hxxp:\/\/trialinsider.com\/f87346b<\/li>\n<li>hxxp:\/\/babil117.com\/f87346b<\/li>\n<\/ul>\n<p><strong>How Quick Heal helps<\/strong><\/p>\n<p>1) Quick Heal\u2019s Email Security feature detects and deletes malicious email attachments such as the ones observed in the case of Jaff ransomware even before they are opened and affect the system.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84319 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_8.png\" alt=\"jaff_ransomware_8\" width=\"298\" height=\"183\" \/><br \/>\nFig 10<\/p>\n<p>2) Quick Heal successfully detects PDF and embedded docm files.<\/p>\n<p>3) The Ransomware Protection feature of Quick Heal detects and prevents encryption activity performed by the Jaff ransomware.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84320 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_9.png\" alt=\"jaff_ransomware_9\" width=\"460\" height=\"267\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_9.png 460w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/05\/Jaff_ransomware_9-300x174.png 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><br \/>\nFig 11<\/p>\n<p><strong>How to stay protected against ransomware attacks<\/strong><\/p>\n<ol>\n<li>Never open email attachments with double extensions such as .doc.js and doc.vbs \u2013 these are most likely to contain malware. Set \u2018systems folder\u2019 options to show extensions for known file types, to identify such files.<\/li>\n<li>Ensure all Microsoft documents including PDF files which are received as email attachments are opened in \u2018Protected View\u2019. <a href=\"https:\/\/support.office.com\/en-us\/article\/What-is-Protected-View-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653\">Click here to know about Protected View<\/a>.<\/li>\n<li>Never download attachments or click on links in emails received from unknown, unwanted or unexpected sources.<\/li>\n<li>Don\u2019t respond to pop-up notifications or alerts while visiting unfamiliar websites.<\/li>\n<li>Apply all recommended security updates to your OS, software, and Internet browsers, if not already.<\/li>\n<li>Have an <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\">antivirus software<\/a> installed on your computer that efficiently blocks spam and malicious emails, and automatically restricts access to malicious websites.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Acknowledgment<\/strong><br \/>\nSubject Matter Expert<br \/>\nSmita Kuyte | Quick\u00a0Heal\u00a0Security\u00a0Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adding to the havoc created by the recent outbreak of the WannaCry Ransomware is a new entry to the list of encrypting ransomware called \u2018Jaff\u2019. Reportedly, this variant has been created by the authors of the Locky ransomware. The source of this ransomware is the Necurs botnet which is using PDF files with embedded docm [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84322,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[910],"tags":[1447,1245,1449,1448],"class_list":["post-84308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-jaff-ransomware","tag-locky-ransomware","tag-necurs-botnet","tag-wannacry-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84308"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84308"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84308\/revisions"}],"predecessor-version":[{"id":84326,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84308\/revisions\/84326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84322"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}