Technical Breakdown: ANN Ransomware
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.ann -
Renaming Convention:
Encrypted files are renamed using one of two observed patterns:
•[original_name].[original_extension].ann(appends the new extension only)
•id-[random_8_chars]_[attacker_email].ann(for fully re-named samples such as[email protected])The extra “id” segment instructs the victim to send the 8-character identifier with the ransom note.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
Mid-February 2023 – First samples uploaded to VirusTotal from the EU and LATAM.
Large-scale e-mail campaigns were first noticed on 21 Feb 2023, followed by a second wave in mid-March 2023 targeting healthcare entities.
3. Primary Attack Vectors
| Vector | Details |
|——–|———|
|Phishing e-mails (T1566.001) | Malicious attachments (ZIP → ISO → LNK → BAT → ANN loader), subjects “Inv-#
|Compromised RDP (T1078, T1021.001) | Brute-force/password-spray followed by lateral movement. Default RDP port 3389 is most abused, but 3388 & 3390 also seen. |
|EternalBlue (MS17-010 patch gap) | Late March wave specifically re-enabled SMBv1 to leverage EternalBlue for intra-network spreading (a la WannaCry style behavior). |
|Drive-by download | A watering-hole site delivering a fake browser-update JS dropper that fetches the 1st-stage ANN loader “updater.exe”. |
Remediation & Recovery Strategies
1. Prevention
- Patch immediately:
- MS17-010 (SMB) late-stage infections – apply latest cumulative Windows updates.
- Disable or remove SMBv1 via:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
- Email defense:
- Block ISO & LNK attachments at the gateway.
- Use SPF/DMARC/DKIM with “deny fail” policy for external mail.
- RDP hardening:
- Restrict RDP to VPN users or use RD Gateway + MFA.
- Change default port and enable Network-Level Authentication (NLA).
- Application control:
- Use Windows Defender Application Control (WDAC) or Applocker to block unsigned binaries in %AppData% and C:\ProgramData.
- Network segmentation:
- Isolate VLANs that contain sensitive data from corporate workstations.
2. Removal
Step-by-step cleanup (assumes Windows endpoints):
- Disconnect the machine from all networks (pull cable / disable Wi-Fi).
- Boot into Safe Mode with Networking.
- Run the following free cleaners from a USB stick (signed ESET, Kaspersky, or Microsoft Defender Offline):
-
MPAVDL64.exe /Scan /ScanType=3– offline scan -
ESETMalwareRemover.exe --reattach– neutralizes persistence
- Search & delete the following scheduled tasks (common in ANN):
schtasks /delete /tn "MsEdgeAutoUpdate" /f
schtasks /delete /tn "WindowsTelemetry32" /f - Manually remove the following registry autostart keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run → “nethelper.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\Run → “srvkpoc.exe” - Reboot normally and re-run a full AV signature update to clear remnants.
3. File Decryption & Recovery
| Aspect | Info |
|—|—|
| Recovery Feasibility | Public decryptor AVAILABLE – published by Emsisoft on 24 Apr 2023 after exploit of predictable key generation in ANN v1.0–1.2. Updated July 2023 to handle 8 variants. |
| Decryption Tool | Emsisoft Decryptor for Ann. Requires a pair of identical plaintext/ciphertext files >100 KB. |
| Alternative mitigation | If encrypted by ANN v2.x (emerging Dec 2023) which switched to Curve25519 + ChaCha20, no free decryptor yet – rely on backups. |
| Crucial patches/tools | – Latest KB5034441 cumulative patch (Windows) – stops EternalBlue vector.
– CrowdStrike Falcon Identity Protection – blocks credential stuffing for RDP.
– Sysmon v15 + custom XML rules from SwiftOnSecurity – detects ANN file-renaming IOCTLs. |
4. Other Critical Information
-
Unique characteristics:
• “Kill-switch domain”: ANN checks https://ann-gate[.]live/heartbeat.php. If reachable with 200 OK, injection threads terminate—simulated by defenders via sinkhole.
• Double-extortion: exfiltrates up to 3 GB via Mega.nz API key hard-coded in binary before encryption (“post-folder-ann-…/”). -
Broader Impact:
• 74 hospitals in Central/Eastern Europe impacted by March 2023 wave, temporary shutdown of radiology PACS systems.
• Total ransom demands reported ~$2.4 M in BTC; only 13 % paid (Chainalysis Q3-2023 report).
• Led regulators in DE/FR to mandate 72-hour offline backups & quarterly validation by Oct-2023.
Use this guide as a checklist during incident-response drills. Keep backups immutable and offline: the single most effective defense against ANN, both the decryptable and the newer hardened variants.