2234
Home Malware Detailed Technical Analysis Report of Spam Campaign Delivers Hermes2.1Ransomware
Detailed Technical Analysis Report of Spam Campaign Delivers Hermes2.1Ransomware Detailed Technical Analysis Report of Spam Campaign Delivers Hermes2.1Ransomware
Malware,Ransomware | 07/30/2018

Detailed Technical Analysis Report of Spam Campaign Delivers Hermes2.1Ransomware


When was the last time you checked your PC health? Do you know your PC requires a regular Check Up!!!

Spam Campaign Delivers Hermes2.1 Ransomware Overview

Recently a new spam campaign has been seen in which an attacker sends a malicious attachment or malicious link of office document file which drops the Hermes Ransomware on the victim machine.

This ransomware doesn’t append the filename of the affected file by adding some extension in the last like other ransomware, it only encrypts the file contents leave the filename as it is.

Once the encryption has been completed it shows the ransom note UI on the screen. Ransom note supports 5 Different Languages.

As per the ransom note, it doesn’t contain any ransom amount information for that victim has to personally send mail to the given contact address of the ransomware author. Thereafter, malware creator will send the details of the ransom amount.

The victim can decrypt any 1 file free by sending the encrypted file to the ransomware creator as a proof. Once the victim sends the payment to the bad actor thereafter they will send the decryption tool to the victim.

But still, we will suggest to everyone that always avoid paying ransom money to the bad actors because it encourages them.

Get peace of mind! Get rid of malicious programs instantly

Free Malware Scan Compatible with Win 10,8.1,8 & 7

Technical Analysis of Hermes2.1 Ransomware

 

File Name: Hermes.exe

MD5: 835F8136367568F90B4F871542E1CD34

SHA1: 070B18F607CCD2282A4A9A3B3FAAFB7E65F08B39

SHA256: CA335C96DDBA1C84ED5B67DACD6931E16ADFBC0E890976DA5DB013A999AD6EAE

File Type: .EXE

Spread Via: Email

 

Detail Description of Hermes2.1 Ransomware with Screenshots

During execution of Selena’s Resume, it’s launch Microsoft Word application in password protected mode. Once the user enters the correct password it will open the following document.

Enable Content

Figure 1 Macro Security Warning

By default, Microsoft Office Application has turned on the Protected Mode Feature & Also Disabled the Macro’s for security purposes.

In case, if the user disabled the protection mechanism & enabled the macro’s feature then the warning message notification didn’t pop up. And it will harm your system.

So, it’s always recommended to never disable the protection mode.

As shown above, in case, if the user clicks on the Enable Content button or doesn’t use Microsoft Default Protected View Mode, the Malicious macro will automatically get executed.

Also, Read: Detailed Technical Analysis Report of Shrug2 Ransomware

If the person tries to view the macro code, it has to again enter another password to view the macro otherwise it won’t be able to view the code.

 download the payload into %temp% location and automatically initiated by the VBA Shell Command.

As shown below following is the macro code, as per the code it tries to download the HERMES ransomware from their C&C server if active. If the C&C server is active, then it will download the file into %temp% location.

Once the file is downloaded onto the victim machine it will be automatically launched by the VBA Shell Command.

Macro Code

Figure 2 Macro Code

On execution of this ransomware it creates the following processes as shown below:

Process Tree

Figure 3 Process Tree

As shown above, when we execute this ransomware manually from the desktop it copies itself into %temp% with the name of “svchosta.exe” and it hides the “hermes.exe” (Desktop File) with the size of 0 bytes as shown below:

Hide Desktop File

Figure 4 Hidden Desktop File with 0 Bytes File Size

Thereafter, this ransomware drops the “Windows.bat” file in C:\Users\Public\Windows.bat that contain the batch script code to delete the volume shadow copies & other backup files from the system.

This ransomware is not stealthy; it runs normally but some files which are dropped by this ransomware (scripting files) need UAC Permission to execute the command as shown below:

UAC Window

Figure 5 UAC Window

Windows batch Exectuable

Figure 6 Windows Batch File Contents

As shown above, windows.bat deletes the other backup files from the system from all the system drive that has DRIVE letters from C to H and also deletes the backup folder from the system if any present and thereafter it deletes itself from the system.

It deletes the following backup files extensions from the system.

.VHD

.BAC

.BAK

.WBCAT

.BKF

Backup

Backup

.set

.Win

.DSK


Thereupon, it launches the ransom note in the browser, as per the ransom note it uses RSA 2048 encryption algorithm and ransom note doesn’t contain any ransom amount information.

Are you worried about your PC health?

Check your PC Health for Free!

Powered By:howtoremoveit.info Run Free Scan

It only has Victim Public ID and Bad Actor Email ID’s (Decryptsupport@protonmail.com Decryptsupport1@cock.li) so that the victim can contact them to receive the payment information. The victim can decrypt one file free as a proof.

Ransom note

Figure 7 Ransom Note

While the ransomware is running in the background it also drops the svchosta.bat in the %temp% folder

SVCHOSTA Batch Script

Figure 8 Svchosta.bat Content

 

IOC’s

Associated File Names & Hashes:

File Name: Hermes.exe

MD5: 835F8136367568F90B4F871542E1CD34

SHA1: 070B18F607CCD2282A4A9A3B3FAAFB7E65F08B39

SHA256: CA335C96DDBA1C84ED5B67DACD6931E16ADFBC0E890976DA5DB013A999AD6EAE

Associated URL

hxxp://205[.]185[.]121[.]209/azo[.]exe

Associated Email ID:

Decryptsupport@protonmail.com

Decryptsupport1@cock.li

Also, Read: Detailed Technical Analysis Report of Danse Bank Phishing Campaign


Tips to Prevent virus and malware from Infecting Your System:
  1. Enable your popup blocker: Pop-ups and ads on the websites are the most adoptable tactic used by cybercriminals or developers with the core intention to spread malicious programs.
    So, avoid clicking uncertain sites, software offers, pop-ups etc. and Install a powerful ad- blocker for ChromeMozilla, and IE
  2. Keep your Windows Updated: To avoid such infections, we recommend that you should always keep your system updated through automatic windows update.By doing this you can keep your device free from virus.According to the survey, outdated/older versions of Windows operating system are an easy target.
  3. Third-party installation: Try to avoid freeware download websites as they usually install bundled of software with any installer or stub file.
  4. Regular Backup: Regular and periodical backup helps you to keep your data safe in case the system is infected by any kind of virus or any other infection.Thus always backup important files regularly on a cloud drive or an external hard drive.
  5. Always have an Anti-Virus: Precaution is better than cure. We recommend that you install an antivirus like ITL Total Security or a good Malware Removal Tool like Download Virus RemovalTool
 

Newsletter

Are your devices Secure?

Best Anti-Malware program in 2018

ad_computer_work
Start Scan Now  Download Time: less than 1 minute
× Zoom Image
×

1

indicatorImg_logo
mlcsetup
2

3

1

2

3

1

2

3