CnTechPost CnTechPost
  • News
    • Tech Industry
    • Gadgets
    • Software
    • Cars
    • Software
  • Contact
  • About
  • CnEVPost

Home ยป Tech Industry

Ransomware 'WannaRen' may have been spreading widely through download sites

By Phate Zhang
Apr 9, 2020 at 7:02 AM UTC
0
0

On April 8, Chinese web security firm Huorong Security confirmed that the suspected sample of WannaRen ransomware shares on the Internet was actually a virus decryption tool.ย  The team then conducted traceability analysis on the real virus samples, and captured its propagation script (currently deleted by the author).

Through further tracing, Huorong Security discovered that the virus propagation script carried by a maliciously tampered open source code editor on the website named Xixi Software Center (www.cr173.com) has homology with the ransomware virus transmission script. Therefore, it is not excluded that the download site was once used as one of the channels for the spread of WannaRen ransomware.

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

The ransomware captured by Huorong Security will execute the two commands of downloading mining virus and ransomware at the same time locally, and can also be spread through the "eternal blue" vulnerability, and uses the asymmetric encryption method like most ransomware viruses. Therefore, it cannot be decrypted for now.

The virus propagation script carried on the Xixi Software website currently only spreads mining viruses, but it does not rule out the possibility of spreading ransomware in the future.

What is worrying is that through the search, the download station's open source code editor ranks first among similar software (as shown below), which may have affected many users.

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Currently, the Huorong Security software (personal version and enterprise version) has defended and intercepted the ransomware virus and its transmission scripts in virus detection, system reinforcement, behavior defense, and firewall.

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

In fact, in order to obtain traffic benefits, various download sites on the Internet have long become a gathering place for viruses and rogue software. Huorong Security has repeatedly disclosed the chaotic phenomenon of the download station.ย  In order to avoid the above-mentioned viruses and other hazards, everyone must go to their official website when downloading the software.

Here is the full analysis report from Huorong:

1. Detailed analysis

Virus spread

The WannaRen ransomware that has spread in large numbers recently is mainly distributed through the "hidden" virus transmission script.ย  Malicious script, as shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Malicious script content

After the virus script is executed, it will download and execute multiple malicious modules, including: ransomware, mining virus, eternal blue vulnerability attack tool.ย  Among them, the eternal blue vulnerability attack module will spread malicious code in the network through a vulnerability attack.

After the attack is successful, a remote malicious script (my ****. At.ua/vip.txt) will be run in the attacked terminal. This script reports that the logic of the above vip.txt malicious script module is basically the same, which is also downloadedย  Many of the above malicious modules also do not rule out the possibility of the malicious script downloading and executing the WannaRen ransomware virus.ย  The content of the script is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Malicious script content (my ****. At.ua/vip.txt)

2. Ransomware virus

The ransomware code is called in the form of "white plus black". The hidden virus spread script will download the "white plus black" malicious modules (wwlib.dll and WinWord.exe) to the c: \ ProgrAMData directory for execution.ย  After the virus runs, it will register C: \ ProgramData \ WinWord.exe as a system service, and the computer will execute malicious code and encrypt user files after the computer restarts.

As shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

"White plus black" malicious module

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Virus service

After restarting, the virus code will start the system program (svchost.exe, cmd.exe, mmc.exe, etc.) to inject the ransomware virus code into the started system process.ย  Relevant behavior phenomena, as shown in the following figure:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Ransomware behavior

The ransomware uses symmetric and asymmetric (RSA + RC4) encryption. Unless the private key of the ransomware author is obtained, it cannot be decrypted.ย  Ransomware first generates a random RC4 key, such as "p2O6111983YU1L", and uses this single key to encrypt all files. The encrypted files will be added with the .WannaRen suffix.

After generating the key, the virus will import the RSA public key to encrypt the randomly generated RC4 key and store it at the head of each encrypted file.ย  The specific code is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Generate random RC4 key

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Import public key encryption RC4 key

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Virus author's public key

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Use RC4 algorithm to encrypt the original file

In order to allow the ransomware computer to continue to be used, the ransomware virus will skip the special path when encrypting, and the skipped path keyword is as shown in the following figure:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Skipped path keywords

The ransomware will encrypt files with specific extensions. The specific file types are shown in the following figure:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Encrypted file extension

The encrypted file is composed of two parts, the front is the encrypted RC4 key, and the back is the encrypted file content.ย  The specific code is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Write encrypted files

An example of the encrypted file is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Encrypted sample file content

The ransomware will release the ransomware document when encrypting each folder, and after completion, it will create "Please decrypt this text.gif", "Please decrypt this text.txt" and a decryption program on the public desktop.ย  @ WannaRen @ .exe ".

The specific code is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Release Ransomware Instructions and Decryption Procedure

The ransomware decryption tool and ransomware letter are shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Ransomware decryption tool

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Extortion letter

2. Traceability analysis

Through the traceability analysis of the script data related to the "WannaRen" ransomware virus, we found that the software in the download station platform "Xixi Software Center" (www.cr173.com) also has a similar malicious script propagation process.

For example, the "Notepad ++" software downloaded from the "Xixi Software Center" carries script code similar to the ransomware transmission process.ย  The relevant page of the download station is shown below:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Xixi Software Center related download page

When the software download is complete, the malicious powershell code is hidden in it, and the relevant code data is shown in the following figure:

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Malicious powershell script code

By decrypting this powershell code, it was found that it will eventually download and execute the malicious script in "http://cpu.sslsngyl90.com/vip.txt".

Comparing this malicious script with the ransomware virus script we obtained before, it is found that except for the "WannaRen" ransomware-related modules, the remaining malicious code is basically the same.

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

Malicious script code comparison

In summary, we do not rule out that the download site was once used as a channel for WananRen ransomware.

3. Appendix

Sample hash

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost

More on Tech Industry

Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Chinese video platform iQIYI reportedly to lay off 20-40% of its workforce
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Xiaomi's MIUI surpasses 500 million monthly active users worldwide
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Education stocks soar with reports that China will resume after-school tutoring
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Huawei posts sales revenue of about $71.3 billion in first 3 quarters
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Luckin Coffee posts H1 net revenue of $492.9 million, up 106% year-on-year
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Alibaba unveils ARM server chip Yitian 710, boasting strongest performance in the industry
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Alibaba reportedly to release Arm server chip
Ransomware 'WannaRen' may have been spreading widely through download sites-CnTechPost
Futu, Tiger extend losses as Chinese securities regulator reportedly refine regulations
Ransomwareransomware virusSecuritySecurity AlertWannaRenWeb Security

Recent Posts

  • DeepSeek makes minor upgrades to its R1 reasoning model May 29, 2025
  • Chinese video platform iQIYI reportedly to lay off 20-40% of its workforce Dec 1, 2021
  • Xiaomi's MIUI surpasses 500 million monthly active users worldwide Nov 24, 2021
  • Education stocks soar with reports that China will resume after-school tutoring Nov 8, 2021
  • Huawei posts sales revenue of about $71.3 billion in first 3 quarters Oct 29, 2021
CnTechPost CnTechPost
CnTechPost.com
  • Home
  • Tech
  • Gadgets
  • Software
Subscribe
  • RSS Feed
About
  • About Us
  • Contact Us
  • Privacy Policy
Copyright ยฉ 2025 CnTechPost.