Home / malwarePDF  

Ransom:Win32/Wagcrypt.A


First posted on 30 January 2017.
Source: Microsoft

Aliases :

There are no other names known for Ransom:Win32/Wagcrypt.A.

Explanation :

Installation

This ransomware arrives in your PC when you use an unknowingly compromised account where the threat gets copied and run remotely.

When run, the following ransom message is dropped as %desktop%\zXz.html.

It also copies itself as C:\services.exe and also modifies the registry, adding a reg.exe file, so that it runs each time you start your PC:

  • reg ADD HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\ /f /v Load /t REG_SZ /d "C:\services.exe"


Payload


This threat also creates a thread that enumerate drives C-Z (FIXED, RAMDISK, REMOTE, REMOVABLE, UNKNOWN).

Encrypts your files

It also encrypts files with the following extensions:

.3gp .cmsc .fmb .mpp .sln .7z .cpp .gz .mtb .soap .accdb .cs .img .olb .sql .ace .csv .ipdb .ost .stm .ai .dat .iso .pdf .svc .ashx .db .issue .png .swf .asmx .dbf .jar .pps .tar .asp .doc .java .ppsx .txt .aspx .docx .jpg .ppt .vdw .bad .dwg .kdbx .pptx .vdx .bak .dxf .kmz .psc .vmdk .bat .edb .ldf .psd .vsd .bdp .edx .lic .pst .war .bdr .efp .log .rar .webm .bkf .eml .max .rdp .xls .bmp .epf .mdb .resx .xlsm .c .ese .mdf .rmvb .xlsx .cfg .exe .me .rtf .xlt .cmd .flv .mkv .sdb .zip

Stops processes or services from running

This ransomware also tries to stop the following services, to release and successfully encrypt the associated files:
  • Microsoft Exchange Information Store
  • MSSQL$CONTOSO1
  • MSSQLSERVER
  • MSSQL$SQLEXPRESS
  • OracleASMService+ASM
  • OracleCSService
  • OracleOraDb10g_home1TNSListener
  • OracleServiceORCL
  • Outlook
  • SQLServerAgent
  • SQLWriter
  • Task Manager
  • WindowsUserManager






Analysis by Jireh Sanico

Last update 30 January 2017

 

TOP