Ransom.Win32.JWORM.A
Windows
Threat Type: Ransomware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
376,832 bytes
EXE
Yes
07 Jun 2019
Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Ransomware adds the following processes:
- cmd.exe /c net stop MSSQLServerADHelper100
- cmd.exe /c net stop MSSQL$ISARS
- cmd.exe /c net stop MSSQL$MSFW
- cmd.exe /c net stop SQLAgent$ISARS
- cmd.exe /c net stop SQLAgent$MSFW
- cmd.exe /c net stop SQLBrowser
- cmd.exe /c net stop ReportServer$ISARS
- cmd.exe /c net stop SQLWriter
- cmd.exe /c net stop WinDefend
- cmd.exe /c net stop mr2kserv
- cmd.exe /c net stop MSExchangeADTopology
- cmd.exe /c net stop MSExchangeFBA
- cmd.exe /c net stop MSExchangeIS
- cmd.exe /c net stop MSExchangeSA
- cmd.exe /c net stop ShadowProtectSvc
- cmd.exe /c net stop SPAdminV4
- cmd.exe /c net stop SPTimerV4
- cmd.exe /c net stop SPTraceV4
- cmd.exe /c net stop SPUserCodeV4
- cmd.exe /c net stop SPWriterV4
- cmd.exe /c net stop SPSearch4
- cmd.exe /c net stop IISADMIN
- cmd.exe /c net stop firebirdguardiandefaultinstance
- cmd.exe /c net stop ibmiasrw
- cmd.exe /c net stop QBCFMonitorService
- cmd.exe /c net stop QBVSS
- cmd.exe /c net stop QBPOSDBServiceV12
- cmd.exe /c net stop "IBM Domino Server(CProgramFilesIBMDominodata)"
- cmd.exe /c net stop "IBM Domino Diagnostics(CProgramFilesIBMDomino)"
- cmd.exe /c net stop "Simply Accounting Database Connection Manager"
- cmd.exe /c net stop QuickBooksDB1
- cmd.exe /c net stop QuickBooksDB2
- cmd.exe /c net stop QuickBooksDB3
- cmd.exe /c net stop QuickBooksDB4
- cmd.exe /c net stop QuickBooksDB5
- cmd.exe /c net stop QuickBooksDB6
- cmd.exe /c net stop QuickBooksDB7
- cmd.exe /c net stop QuickBooksDB8
- cmd.exe /c net stop QuickBooksDB9
- cmd.exe /c net stop QuickBooksDB10
- cmd.exe /c net stop QuickBooksDB11
- cmd.exe /c net stop QuickBooksDB12
- cmd.exe /c net stop QuickBooksDB13
- cmd.exe /c net stop QuickBooksDB14
- net stop MSSQLServerADHelper100
- net stop MSSQL$ISARS
- net stop MSSQL$MSFW
- net stop SQLAgent$ISARS
- %System%\net1 stop MSSQLServerADHelper100
- %System%\net1 stop MSSQL$ISARS
- net stop SQLAgent$MSFW
- %System%\net1 stop MSSQL$MSFW
- %System%\net1 stop SQLAgent$ISARS
- net stop SQLBrowser
- net stop ReportServer$ISARS
- %System%\net1 stop SQLAgent$MSFW
- net stop SQLWriter
- %System%\net1 stop SQLBrowser
- %System%\net1 stop ReportServer$ISARS
- net stop WinDefend
- %System%\net1 stop SQLWriter
- net stop mr2kserv
- net stop MSExchangeADTopology
- %System%\net1 stop WinDefend
- net stop MSExchangeFBA
- %System%\net1 stop mr2kserv
- net stop MSExchangeIS
- %System%\net1 stop MSExchangeADTopology
- %System%\net1 stop MSExchangeFBA
- net stop MSExchangeSA
- net stop ShadowProtectSvc
- %System%\net1 stop MSExchangeIS
- net stop SPAdminV4
- %System%\net1 stop MSExchangeSA
- net stop SPTimerV4
- %System%\net1 stop ShadowProtectSvc
- net stop SPTraceV4
- %System%\net1 stop SPAdminV4
- %System%\net1 stop SPTimerV4
- net stop SPUserCodeV4
- net stop SPWriterV4
- %System%\net1 stop SPTraceV4
- %System%\net1 stop SPUserCodeV4
- net stop SPSearch4
- %System%\net1 stop SPWriterV4
- net stop IISADMIN
- %System%\net1 stop SPSearch4
- net stop firebirdguardiandefaultinstance
- %System%\net1 stop IISADMIN
- net stop ibmiasrw
- %System%\net1 stop firebirdguardiandefaultinstance
- net stop QBCFMonitorService
- net stop QBVSS
- %System%\net1 stop ibmiasrw
- net stop QBPOSDBServiceV12
- %System%\net1 stop QBCFMonitorService
- net stop "IBM Domino Server(CProgramFilesIBMDominodata)"
- %System%\net1 stop QBVSS
- net stop "IBM Domino Diagnostics(CProgramFilesIBMDomino)"
- %System%\net1 stop QBPOSDBServiceV12
- %System%\net1 stop "IBM Domino Server(CProgramFilesIBMDominodata)"
- %System%\net1 stop "IBM Domino Diagnostics(CProgramFilesIBMDomino)"
- net stop "Simply Accounting Database Connection Manager"
- net stop QuickBooksDB1
- net stop QuickBooksDB2
- %System%\net1 stop "Simply Accounting Database Connection Manager"
- net stop QuickBooksDB3
- %System%\net1 stop QuickBooksDB1
- net stop QuickBooksDB4
- %System%\net1 stop QuickBooksDB2
- net stop QuickBooksDB5
- %System%\net1 stop QuickBooksDB3
- net stop QuickBooksDB6
- %System%\net1 stop QuickBooksDB4
- %System%\net1 stop QuickBooksDB5
- %System%\net1 stop QuickBooksDB6
- %System%\net1 stop QuickBooksDB7
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
This report is generated via an automated analysis system.
SOLUTION
9.850
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Identify and terminate files detected as Ransom.Win32.JWORM.A
- Windows Task Manager may not display all running processes. In this case, please use a third-party process viewer, preferably Process Explorer, to terminate the malware/grayware/spyware file. You may download the said tool here.
- If the detected file is displayed in either Windows Task Manager or Process Explorer but you cannot delete it, restart your computer in safe mode. To do this, refer to this link for the complete steps.
- If the detected file is not displayed in either Windows Task Manager or Process Explorer, continue doing the next steps.
Step 3
Scan your computer with your Trend Micro product to delete files detected as Ransom.Win32.JWORM.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Step 4
Restore encrypted files from backup.
Did this description help? Tell us how we did.