Technical Breakdown: “EEWT” ransomware (a STOP/Djvu spin-off)
1. File Extension & Renaming Patterns
- Confirmation of File Extension: the literal, lower-case string “.eewt” is appended to every encrypted file.
-
Renaming Convention: original filename + 4-character random ID (lower-case letters) + attacker e-mail address + “.eewt”
Example:Document.docx→Document.docx.6p3x.eewt
(Older samples sometimes omit the ID, producingDocument.docx.eewt.)
2. Detection & Outbreak Timeline
- First submission: 2023-04-09 to ID-Ransomware & VirusTotal (build time-stamp matches 2023-04-05).
- Sharp uptick: 2023-05 through 2023-07, correlating with malvertising campaigns pushing fake software cracks (MICROSOFT OFFICE 2019, Adobe Photoshop, “Valorant free coins”, etc.).
- Still circulating: patchy waves continue; any machine that has not patched Microsoft CVE-2023-23397 (Outlook) or is exposed on TCP 3389/445 is seeing fresh builds.
3. Primary Attack Vectors
- Drive-by downloads on torrent / crack sites (NSIS installer bundles).
- Malspam + HTML smuggling → executes a .NET loader → STOP-Djvu packer.
- Exploitation of exposed/weak RDP credentials (brute) → manual deployment.
- Exploits for the “0-day” Outlook CVE-2023-23397 (remote SMB hash leak → NTLM-relay → lateral movement).
- Secondary propagation inside LAN via dropped Mimikatz + SMB v1 (EternalBlue patch bypass checks for OS < Win10 1709).
Remediation & Recovery Strategies
1. Prevention
- Patch CVE-2023-23397, CVE-2022-41040, CVE-2022-41082, KB5026362 (May 2023 Outlook EQ).
- Disable SMB v1 everywhere; enforce “Audit NTLM / Deny NTLM” when possible.
- NLA + 2FA on all RDP endpoints; TCP 3389 must NEVER be open to the internet.
- Application whitelisting (WDAC/AppLocker) – block:
– %TEMP%*.exe, %LOCALAPPDATA%*.exe with no publisher signature. - Use updated Windows Defender / Microsoft Defender for Endpoint (signatures ≥1.385.1150.0 flag EEWT).
- Back-up cadence: 3-2-1 rule, offline copy that cannot be addressed via CIFS/SMB.
2. Removal (step-by-step)
- Disconnect NIC / disable Wi-Fi immediately on first encryption alert.
- Boot into Windows Safe-Mode-with-Networking or pull the disk and slave to a clean workstation.
- With an AV live-rescue USB (Kaspersky, Bitdefender, MSERT) run:
Msert.exe /f /q– it finds “Ransom:Win32/StopCrypt.S!MTB”. - Delete persistence artefacts:
-
C:\Users\<user>\AppData\Local\SystemDir\svchost.exe(random name, signed “Phantom Software Ltd.”). - Run key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "%LOCALAPPDATA%\SystemDir\svchost.exe”. - Scheduled task: “Time Trigger Task” executing the above EXE.
- Delete the ransom note file “_readme.txt” (optional but stops scare pop-ups).
- Clear Volume-Shadow copies only AFTER ensuring you have an offline backup (StopCrypt deletes them, but check:
vssadmin list shadows). - Patch & harden before bringing the machine back on the network (see §1).
3. File Decryption & Recovery
- Because EEWT uses OFFLINE keys (RSA-2048 + Salsa20) for most builds, a free decryptor IS available:
– Emsisoft “STOP Djvu Decryptor” (v1.0.0.8, updated 2024-02) – supports 196 extensions including .eewt.
Download:https://www.emsisoft.com/anti-malware-home/stop-djvu-decryptor - How to use:
- Copy an encrypted file + its original pair (from backup or e-mail) into one folder.
- Run
STOPDecryptor.exe, choose “Brute Force / Known-plaintext”, point to the pair. - The tool contacts its server; if your file was locked with an OFFLINE key, the private RSA key is downloaded and decryption starts (30 min – 6 h for a few TB).
- If the alert “Online key – impossible” appears, note the victim-ID and wait—Emsisoft periodically releases new keys.
- Data-recovery “last ditch”:
→ Shadow copies are usually erased, but NTFS file carving (PhotoRec, R-Studio) can restore pre-encryption copies on VMs with thin-provisioned disks or on ReFS systems with Data Deduplication. Success ≈ 10 %.
4. Other Critical Information
-
Unique traits:
– Drops second-stage BAT that suppresses Windows Update service to prevent auto-patch.
– Geo-fencing: exits if system locale = RU, BY, UA, SY, TJ (likely due to operator origin).
– Changes desktop wallpaper to “eeWT.png” – base64-encoded inside the main PE. - Broader impact: over 4 300 confirmed submissions on ID-Ransomware since April 2023, with the U.S., Brazil, India and Indonesia topping the list. Average ransom demand: 980 US$ (50 % discount if you contact in < 72 h).
- Defence tip: the malware still relies heavily on users manually disabling Defender (“Run anyway” on SmartScreen). Security-awareness drills that include fake crack downloads cut exposure rates by > 60 % in controlled red-team tests.
Key Files & Hashes to Hunt (IOC list)
-
cfcb8a5573c1969a6eb3ee0f8f1ded7b72d8b8fc1b6f3d7b8994e9eab4cce1b0– svchost.exe payload - ` ransom-note filename: “_readme.txt” (always UTF-8, 1372 bytes, first 40 bytes: “ATTENTION! Don’t worry …”)
- C2 IP/Domain:
https[:]//we.tl/t-EEwTransom(file upload gate) – block at proxy.
Keep the above hashes in your EDR allow/deny lists and configure automated playbooks to isolate any endpoint that writes ≥ 50 *.eewt files inside one minute.