Ransom_BTCWARE.AI

 Analysis by: Nikko Tamana

 ALIASES:

Gen:Variant.Ransom.BTCWare.34 (Bitdefender), Trojan-Ransom.Win32.Bitcovar.dn (Kaspersky), Ransom:Win32/Betisrypt.D (Microsoft), Ransom.BTCware (Norton)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Ransomware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It is capable of encrypting files in the affected system.

It drops files as ransom note.

  TECHNICAL DETAILS

File Size:

120,832 bytes

File Type:

EXE

Initial Samples Received Date:

17 Oct 2017

Arrival Details

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Ransomware drops the following files:

  • %Application Data%\payday.hta

(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)

Other System Modifications

This Ransomware adds the following registry entries as part of its installation routine:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
payday = %Application Data%\payday.hta

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
baby = %Application Data%\payday.hta

Other Details

This Ransomware is capable of encrypting files in the affected system.

It executes the following command to disable/stop/delete Windows components:

  • cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
  • cmd.exe /c bcdedit.exe /set {default} recoveryenabled No
  • cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
  • vssadmin.exe Delete Shadows /All /Quiet

Ransomware Routine

This Ransomware appends the following extension to the file name of the encrypted files:

  • .[payday@cryptmaster.info]-id-3F8.payday

It drops the following file(s) as ransom note:

  • %System Root%\!! RETURN FILES !!.txt

(Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.)