Ransom.Win32.MIMIC.SMZTJJ-A
UDS:Trojan-Ransom.Win32.Mimic.gen (KASPERSKY), Trojan-Ransom.Mimic (IKARUS)
Windows
Tipo de malware
Ransomware
Destructivo?
No
Cifrado
In the Wild:
³§¨ª
Resumen y descripci¨®n
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Elimina entradas de registro para causar el funcionamiento incorrecto de aplicaciones y programas.
Detalles t¨¦cnicos
Detalles de entrada
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
±õ²Ô²õ³Ù²¹±ô²¹³¦¾±¨®²Ô
Infiltra los archivos siguientes:
- {All affected directories}\Decrypt_me.txt
- %User Temp%\session.tmp
- %AppDataLocal%\{GUID}\bestplacetolive.exe
- %AppDataLocal%\{GUID}\session.tmp
- %User Temp%\{random letters}.{random letters}.ps1
- %User Temp%\{random letters}.{random letters}.psm1
- %AppDataLocal%\{GUID}\Everything32.dll
(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).
)Agrega los procesos siguientes:
- "%AppDataLocal%\{GUID}\bestplacetolive.exe"
- "%AppDataLocal%\{GUID}\bestplacetolive.exe" -e watch -pid {PID of bestplacetolive.exe} -!
- "%AppDataLocal%\{GUID}\bestplacetolive.exe" -e ul1
- "%AppDataLocal%\{GUID}\bestplacetolive.exe" -e ul2
- powercfg.exe -H off
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 1} 0
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 2} 0
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 3} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 1} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 2} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID} {GUID Subgroup} {GUID Setting 3} 0
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 1} 0
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 2} 0
- powercfg.exe -SETACVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 3} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 1} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 2} 0
- powercfg.exe -SETDCVALUEINDEX {Power scheme GUID 2} {GUID Subgroup} {GUID Setting 3} 0
- powercfg.exe -S {Power scheme GUID}
- powercfg.exe -S {Power scheme GUID 2}
- powershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"
- powershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"
- powershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"
- cmd.exe /c DC.exe /D
Crea las carpetas siguientes:
- %AppDataLocal%\{GUID}
- %System Root%\temp
(Nota: %System Root% es la carpeta ra¨ªz, normalmente C:\. Tambi¨¦n es la ubicaci¨®n del sistema operativo).
)Agrega las siguientes exclusiones mutuas para garantizar que solo se ejecuta una de sus copias en todo momento:
- iitiitLavvoiteaieii
T¨¦cnica de inicio autom¨¢tico
Agrega las siguientes entradas de registro para permitir su ejecuci¨®n autom¨¢tica cada vez que se inicia el sistema:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
bestplacetolive = "%AppDataLocal%\{GUID}\bestplacetolive.exe"
Otras modificaciones del sistema
Modifica las siguientes entradas de registro:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
services\VSS
Start = 4
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
services\SDRSVC
Start = 4
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
services\wbengine
Start = 4
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
shutdownwithoutlogon = 0
(Note: The default value data of the said registry entry is 1.)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control\FileSystem
LongPathsEnabled = 1
(Note: The default value data of the said registry entry is 0.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
DataCollection
AllowTelemetry = 0
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
ConsentPromptBehaviorAdmin = 0
(Note: The default value data of the said registry entry is 5.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
ConsentPromptBehaviorUser = 0
(Note: The default value data of the said registry entry is 3.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
PromptOnSecureDesktop = 0
(Note: The default value data of the said registry entry is 1.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
System
EnableLUA = 0
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
ZoneMap
UNCAsIntranet = 0
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
ZoneMap
AutoDetect = 1
(Note: The default value data of the said registry entry is 0.)
Elimina las siguientes entradas de registro:
HKEY_CURRENT_USER\Software\Policies\
Microsoft\Windows
System = DisableCMD
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows
System = DisableCMD
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings
ZoneMap = ProxyBypass
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings
ZoneMap = ProxyBypass
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings
ZoneMap = IntranetName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Internet Settings
ZoneMap = IntranetName
Finalizaci¨®n del proceso
Finaliza los procesos siguientes si detecta que se ejecutan en la memoria del sistema afectado:
- agntsvc.exe
- autodeskDesktopApp.exe
- axlbridge.exe
- bedbh.exe
- benetns.exe
- bengien.exe
- beserver.exe
- CoreSync.exe
- Creative Cloud.exe
- dbeng50.exe
- dbsnmp.exe
- encsvc.exe
- EnterpriseClient.exe
- fbguard.exe
- fbserver.exe
- fdhost.exe
- fdlauncher.exe
- httpd.exe
- isqlplussvc.exe
- java.exe
- msaccess.exe
- MsDtSrvr.exe
- msftesql.exe
- mspub.exe
- mydesktopqos.exe
- mydesktopservice.exe
- mysqld-nt.exe
- mysqld-opt.exe
- mysqld.exe
- node.exe
- ocautopds.exe
- ocomm.exe
- ocssd.exe
- oracle.exe
- pvlsvr.exe
- python.exe
- QBDBMgr.exe
- QBDBMgrN.exe
- QBIDPService.exe
- qbupdate.exe
- QBW32.exe
- QBW64.exe
- Raccine.exe
- Raccine_x86.exe
- RaccineElevatedCfg.exe
- RaccineSettings.exe
- RAgui.exe
- raw_agent_svc.exe
- SimplyConnectionManager.exe
- sqbcoreservice.exe
- sqlagent.exe
- sqlbrowser.exe
- sqlmangr.exe
- Sqlservr.exe
- sqlwriter.exe
- Ssms.exe
- Sysmon.exe
- Sysmon64.exe
- tbirdconfig.exe
- tomcat6.exe
- VeeamDeploymentSvc.exe
- vsnapvss.exe
- vxmon.exe
- wdswfsafe.exe
- wpython.exe
- wsa_service.exe
- wxServer.exe
- wxServerView.exe
- xfssvccon.exe
Otros detalles
Agrega las siguientes entradas de registro como parte de la rutina de instalaci¨®n:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion
Image File Execution Options = {list of processes to be terminated}
HKEY_LOCAL_MACHINE\SOFTWARE
Classes = mimicfile
HKEY_LOCAL_MACHINE\SOFTWARE
Classes = .QUIETPLACE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
HidePowerOptions = 1
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
HidePowerOptions = 1
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
NoClose = 1
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer
StartMenuLogOff = 1
Requiere los componentes adicionales siguientes para ejecutarse correctamente:
- Everything32.dll
Hace lo siguiente:
- Collecting system information
- Creating persistence via the RUN key
- Bypassing User Account Control (UAC)
- Disabling Windows Defender
- Disabling Windows telemetry
- Activating anti-shutdown measures
- Activating anti-kill measures
- Unmounting Virtual Drives
- Terminating processes and services
- Disabling sleep mode and shutdown of the system
- Removing indicators
- Inhibiting System Recovery
Soluciones
Step 2
Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploraci¨®n, deben comprobar que tienen desactivada la opci¨®n Restaurar sistema para permitir la exploraci¨®n completa del equipo.
Step 3
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 4
Eliminar esta clave del Registro
Importante: si modifica el Registro de Windows incorrectamente, podr¨ªa hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe c¨®mo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\SOFTWARE\
- Classes = mimicfile
- Classes = mimicfile
- In HKEY_LOCAL_MACHINE\SOFTWARE\
- Classes = .QUIETPLACE
- Classes = .QUIETPLACE
Step 5
Eliminar este valor del Registro
Importante: si modifica el Registro de Windows incorrectamente, podr¨ªa hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe c¨®mo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\{all entries ending in .exe}
- Debugger = %System%\Systray.exe
- Debugger = %System%\Systray.exe
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
- HidePowerOptions = 1
- HidePowerOptions = 1
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
- HidePowerOptions = 1
- HidePowerOptions = 1
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
- NoClose = 1
- NoClose = 1
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
- StartMenuLogOff = 1
- StartMenuLogOff = 1
Step 6
Buscar y eliminar estas carpetas
- %AppDataLocal%\{GUID}
- %System Root%\temp
Step 7
Buscar y eliminar este archivo
- %User Temp%\session.tmp
- {All affected directories}\Decrypt_me.txt
- %User Temp%\{random letters}.{random letters}.ps1
- %User Temp%\{random letters}.{random letters}.psm1
- %AppDataLocal%\{GUID}\bestplacetolive.exe
- %AppDataLocal%\{GUID}\session.tmp
- %AppDataLocal%\{GUID}\Everything32.dll
Step 8
Restaurar este valor del Registro modificado
Importante: si modifica el Registro de Windows incorrectamente, podr¨ªa hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe c¨®mo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- shutdownwithoutlogon = 0 (Change to default value: 1)
- shutdownwithoutlogon = 0 (Change to default value: 1)
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\FileSystem
- LongPathsEnabled = 1 (Change to default value: 0)
- LongPathsEnabled = 1 (Change to default value: 0)
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection
- AllowTelemetry = 0 (Change to default value: 3)
- AllowTelemetry = 0 (Change to default value: 3)
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- ConsentPromptBehaviorAdmin = 0 (Change to default value: 5)
- ConsentPromptBehaviorAdmin = 0 (Change to default value: 5)
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- ConsentPromptBehaviorUser = 0 (Change to default value: 3)
- ConsentPromptBehaviorUser = 0 (Change to default value: 3)
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- PromptOnSecureDesktop = 0 (Change to default value: 1)
- PromptOnSecureDesktop = 0 (Change to default value: 1)
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- EnableLUA = 0 (Change to default value: 1)
- EnableLUA = 0 (Change to default value: 1)
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
- UNCAsIntranet = 0 (Change to default value: 1)
- UNCAsIntranet = 0 (Change to default value: 1)
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
- AutoDetect = 1 (Change to default value: 0)
- AutoDetect = 1 (Change to default value: 0)
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS
- Start = 4 (Change to default value: 3)
- Start = 4 (Change to default value: 3)
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SDRSVC
- Start = 4 (Change to default value: 3)
- Start = 4 (Change to default value: 3)
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\wbengine
- Start = 4 (Change to default value: 3)
- Start = 4 (Change to default value: 3)
Step 9
Restore these deleted registry keys/values from backup
*Note: Only Microsoft-related keys/values will be restored. If the malware/grayware also deleted registry keys/values related to programs that are not from Microsoft, please reinstall those programs on your computer.
- In HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows
- System = DisableCMD
- System = DisableCMD
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
- System = DisableCMD
- System = DisableCMD
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
- ZoneMap = ProxyBypass
- ZoneMap = ProxyBypass
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
- ZoneMap = ProxyBypass
- ZoneMap = ProxyBypass
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
- ZoneMap = IntranetName
- ZoneMap = IntranetName
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
- ZoneMap = IntranetName
- ZoneMap = IntranetName
Step 10
Restore encrypted files from backup.
Step 11
Explorar el equipo con su producto de live casino online para eliminar los archivos detectados como Ransom.Win32.MIMIC.SMZTJJ-A En caso de que el producto de live casino online ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no ser¨¢n necesarios m¨¢s pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta para obtener m¨¢s informaci¨®n.
Rellene nuestra encuesta!