Home / malware Worm:MSIL/Crilock.A
First posted on 18 January 2014.
Source: MicrosoftAliases :
There are no other names known for Worm:MSIL/Crilock.A.
Explanation :
Threat behavior
Installation
This threat drops itself as msunet.exe in.
It creates the following registry entry so that it automatically runs every time Windows starts:
In subkeys: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value = "Userinit"
With data = "\userinit.exe,, \msunet.exe"
In subkeys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run and HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value = "MSUpdate"
With data = "\msunet.exe"
In subkeys: HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce and HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
Sets value = "*MSUpdateData"
With data: "\msunet.exe"
Spreads via...
Removable drives
It drops copies of itself in all removable drives with the name setup.exe. It might also overwrite any EXE file found in these removable drives.
Payload
Changes Autorun settings
This threat changes the Autorun/Autoplay feature for removable USB and CD/DVD drives to a default value:
In subkeys: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer and HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoDriveTypeAutoRun"
With data: "145"
Encrypts files
This threat goes through your PC and encrypts the following file types using a unique public key with RSA-4096. It then asks you to pay to receive the private key and retrieve your files. It asks you to pay using Bitcoin within a 72-hour period.
- 3fr
- accdb
- ai
- arw
- bay
- cdr
- cer
- cr2
- crt
- crw
- dbf
- dcr
- der
- dng
- doc
- docm
- docx
- dwg
- dxf
- dxg
- eps
- erf
- indd
- jpe
- jpg
- kdc
- mdb
- mdf
- mef
- mp3
- mp4
- mrw
- nef
- nrw
- odb
- odm
- odp
- ods
- odt
- orf
- p12
- p7b
- p7c
- pdd
- pef
- pem
- pfx
- ppt
- pptm
- pptx
- psd
- pst
- ptx
- r3d
- raf
- raw
- rtf
- rwl
- srf
- srw
- txt
- wb2
- wpd
- wps
- xlk
- xls
- xlsb
- xlsm
- xlsx
It avoids encrypting files in these folders:
- :\windows
- :\program files
- :\programdata
- :\$windows
- :\$recycle.bin\
- \appdata\
- \application data\
Send and receive commands
As of this writing, this threat connects to these servers to receive commands and send information about your PC:
- strathmorej.byethost3.com
- strathmorej.coolpage.biz
It can receive these commands:
- Update itself
- Disable shutting down your PC
- Run a denial of service (DoS) attack against a given system
- Get information about your PC
Analysis by Marianne Mallen
Symptoms
The following could indicate that you have this threat on your PC:
- You have these file:
\msunet.exe - You see these entries or keys in your registry:
In subkeys: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value = "Userinit"
With data = "\userinit.exe,, \msunet.exe"
In subkeys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run and HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value = "MSUpdate"
With data = "\msunet.exe"
In subkeys: HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce andHKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
Sets value = "*MSUpdateData"
With data: "\msunet.exe"
- You can't open files and you're asked to pay a ransom to retrieve them
Last update 18 January 2014