{"id":86736,"date":"2018-08-28T18:37:23","date_gmt":"2018-08-28T13:07:23","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86736"},"modified":"2018-08-28T18:37:23","modified_gmt":"2018-08-28T13:07:23","slug":"new-ransomware-campaign-wildryuk","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-ransomware-campaign-wildryuk\/","title":{"rendered":"A new ransomware campaign in the wild,Ryuk!!"},"content":{"rendered":"<p>Recently, Quick Heal Security Labs observed a new destructive ransomware named \u2018<strong>Ryuk.<\/strong> Ransomware\u2019. This ransomware campaign has already affected many users worldwide and seems to be a spear phishing attack. The compelling thing, it encrypts victim files without appending any extension but making files unreadable.<\/p>\n<p>Ryuk uses robust military algorithms such as \u2018RSA4096\u2019 and \u2018AES-256\u2019 to encrypt files. We have seen that the infection vector of this ransomware is exploit kits and spam emails. This ransomware demands a ransom ranging from 15 BTC to 50 BTC in the form of Bitcoin to decrypt the files.<\/p>\n<p><strong>Technical Analysis:<\/strong><\/p>\n<p>After execution of the mother file, it dropped following files<\/p>\n<table style=\"height: 59px\" width=\"904\">\n<tbody>\n<tr>\n<td width=\"335\">C:\\Users\\Public\\public<\/td>\n<td width=\"320\">Used to hold RSA public key.<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">C:\\Users\\Public\\ UNIQUE_ID_DO_NOT_REMOVE<\/td>\n<td width=\"320\">Used to hold hardcoded key.<\/td>\n<\/tr>\n<tr>\n<td width=\"335\">C:\\Users\\Public\\windows.bat<\/td>\n<td width=\"320\">Used to delete shadow volumes and backup files.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86738\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/1-2.jpg\" alt=\"\" width=\"1056\" height=\"436\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-2.jpg 1056w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-2-300x124.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-2-768x317.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-2-650x268.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-2-789x326.jpg 789w\" sizes=\"(max-width: 1056px) 100vw, 1056px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1: Batch file containing the commands to delete the shadow copies and backup files.<\/p>\n<p>The next step is that it executes <em>taskkill<\/em> and <em>net<\/em> commands to kill more than 40 processes and terminates around 180 majorly required services in the machine. Following snippets shows the details<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86739\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/2-4.png\" alt=\"\" width=\"349\" height=\"140\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-4.png 349w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-4-300x120.png 300w\" sizes=\"(max-width: 349px) 100vw, 349px\" \/><\/p>\n<p style=\"text-align: center\">Fig 2: Execution of <em>taskkill to <\/em>kill processes<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86740\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/3-4.png\" alt=\"\" width=\"341\" height=\"140\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-4.png 341w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-4-300x123.png 300w\" sizes=\"(max-width: 341px) 100vw, 341px\" \/><\/p>\n<p style=\"text-align: center\">Fig 3: Execution of <em>net to <\/em>terminate services<\/p>\n<p>From further analysis, we have found that the terminated processes and services are mainly associated with the database, antivirus, backup and document editing software.<\/p>\n<p>Following snippet shows some of the processes and services it kills.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86741\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/4.jpg\" alt=\"\" width=\"414\" height=\"642\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4.jpg 414w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-193x300.jpg 193w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-251x390.jpg 251w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/p>\n<p style=\"text-align: center\">Fig 4: List of killed processes and services<\/p>\n<p>The Ryuk Ransomware uses below command to create run registry to gain persistence even after the system is restarted as shown in the below snippet<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86743\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/5-4.png\" alt=\"\" width=\"606\" height=\"63\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-4.png 606w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-4-300x31.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p style=\"text-align: center\">Fig 5: Registry entry created at <em>Run<\/em><\/p>\n<p>From the analysis, Ryuk is found to be performing memory code injection. For this, it uses \u2018<em>openprocess<\/em><em>\u2019 <\/em>to get the handle on target process and using \u2018<em><a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa366890(v=vs.85).aspx\">VirtualAllocEx<\/a>\u2019, <\/em>it creates buffer inside its address space.<\/p>\n<p>The allocated memory size is of the same size of malware image. It then writes into the allocated memory using \u2018<em>WriteProcessMemory\u2019 <\/em>API and creates a Remote thread into the targeted virtual address space using \u2018<em><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/api\/processthreadsapi\/nf-processthreadsapi-createremotethread\">CreateRemoteThread<\/a><\/em>\u2019 API.<\/p>\n<p>Following IDA pro snippet shows us the code flow used to perform memory injection.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86744\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/6-7.png\" alt=\"\" width=\"458\" height=\"593\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-7.png 458w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-7-232x300.png 232w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-7-301x390.png 301w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><\/p>\n<p style=\"text-align: center\">Fig 6: code flow used to perform memory injection<\/p>\n<p>Ryuk ransomware encrypts each local drive except the locations which are hardcoded in it. this white list includes \u2018Windows\u2019, \u2018Mozilla\u2019, \u2018Chrome\u2019, \u2018RecycleBin\u2019 etc.<\/p>\n<p>It also tries to encrypt shared systems on the network.<\/p>\n<p>It had dropped two ransom notes, one is short and the other is in depth as shown below<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86746\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/7-2.jpg\" alt=\"\" width=\"1183\" height=\"758\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-2.jpg 1183w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-2-300x192.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-2-768x492.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-2-609x390.jpg 609w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-2-789x506.jpg 789w\" sizes=\"(max-width: 1183px) 100vw, 1183px\" \/><\/p>\n<p style=\"text-align: center\">Fig 7: Ransom Note in depth<\/p>\n<p>How Quick Heal protects its users from the <strong>Ryuk Ransomware<\/strong><\/p>\n<p>Quick Heal successfully blocks Ryuk ransomware with the following protection layers:<\/p>\n<ol>\n<li>Virus Protection<\/li>\n<li>Behavior-based Detection<\/li>\n<li>Anti-Ransomware<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86747\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/8-1.png\" alt=\"\" width=\"298\" height=\"158\" \/><\/p>\n<p style=\"text-align: center\">Fig 8: Behavior Detection<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86748\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/9-1.png\" alt=\"\" width=\"460\" height=\"263\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/9-1.png 460w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/9-1-300x172.png 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/p>\n<p style=\"text-align: center\">Fig 9: Anti-Ransomware Module<\/p>\n<p><strong>How to stay safe from ransomware attacks:<\/strong><\/p>\n<ul>\n<li>Always take a backup of your important data in external drives like HDD and pen drives. Consider using a reliable Cloud service to store the data.<\/li>\n<li>Do not install any freeware or cracked versions of any software.<\/li>\n<li>Do not open any advertisement pages shown on websites without knowing that they are genuine.<\/li>\n<li>Disable macros while using MS Office.<\/li>\n<li>Update your antivirus to protect your system from unknown threats.<\/li>\n<li>Do not click on links or download attachments in emails from unexpected, unknown or unwanted sources.<\/li>\n<\/ul>\n<p><strong>Indicators of compromise:<\/strong><\/p>\n<p>8d3f68b16f0710f858d8c1d2c699260e6f43161a5510abb0e7ba567bd72c965b<\/p>\n<p><strong>Subject matter experts: &#8211;<\/strong><\/p>\n<p>Shashikala Halagond, Priyanka Dhasade, Poonam Dongare | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, Quick Heal Security Labs observed a new destructive ransomware named \u2018Ryuk. Ransomware\u2019. This ransomware campaign has already affected many users worldwide and seems to be a spear phishing attack. The compelling thing, it encrypts victim files without appending any extension but making files unreadable. Ryuk uses robust military algorithms such as \u2018RSA4096\u2019 and \u2018AES-256\u2019 [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":86750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[163,152,22,50,47],"class_list":["post-86736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cyber-crime","tag-cyberespionage","tag-email-malware","tag-ransomware","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86736"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86736"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86736\/revisions"}],"predecessor-version":[{"id":86749,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86736\/revisions\/86749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86750"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}