Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.complete
– the extension is appended after the original file extension (e.g.,Document.xlsx.complete
). - Renaming Convention:
- Original filename is preserved.
- Hard-coded string
.complete
is appended unconditionally; no additional hex or UID tokens are used. - If a
.complete
file already exists, the variant overwrites it with a new encryption blob—no counter digits are added. - NTFS “READONLY” attribute is toggled on post-encryption to prevent easy deletion.
2. Detection & Outbreak Timeline
- First Public Capture: 2023-03-27 (uploaded to VirusTotal from Netherlands).
- First Mass Circulation: 2023-12 observed in spam campaigns hitting ≈ 32 countries; waves ramping in 2024-04 and 2024-05 tied to Proxy-Logon exploitation.
- Latest Signatures & IOCs: Updated regularly in ESET, Bitdefender, and Microsoft Defender as of 2024-05-14 (rule IDs Tascal-StrongComplete-Gen, Trojan:Ransom/Complete.MR).
3. Primary Attack Vectors
-
Phishing Emails (95 % of incidents)
– ZIP or ISO attachments containing.exe
inside two-tier archive to evade gateway scanners.
– Faux payment receipt, fake invoice themes. -
EternalBlue Exploit (CVE-2017-0144, patched)
– Legacy Windows 7 · Server 2008 R2 without MS17-010 still targeted. -
ProxyShell Chaining
– CVE-2021-34473 → CVE-2021-34523 → RCE and privilege escalation on unpatched Exchange 2013/2016/2019 (fully patched in Sept-2021). -
Exploited RDP / TeamViewer
– Weak or cracked credentials + lateral movement via Cobalt-Strike beacon dropper that subsequently deploys.complete
. -
Compromised Software Vendors
– Attackers inject.complete
payload into cracked Adobe Photoshop installers circulated on torrent sites (May-2024 campaign).
Remediation & Recovery Strategies
1. Prevention
- Patch immediately – especially for Exchange (ProxyShell trio), SMBv1 (disable + patch), and Windows (MS17-010).
- Disable macro execution by default; deploy ASR rule “Block Office from creating executable content” (Microsoft Defender).
- Enforce MFA on email, VPN, and RDP.
- Segment networks: block lateral SMB on local firewall for endpoints.
- AppLocker / Windows Defender Application Control: whitelist allowed executables.
- Backup hygiene: 3-2-1 rule; ensure at least one copy is offline / immutable (Veeam ReFS immutability or WORM S3).
2. Removal – Step-by-Step
- Identify & isolate: Power off NIC, remove from domain, evict from Wi-Fi.
- Preserve evidence: Do not reboot or run antivirus “quarantine only”; image disks first (dd, FTK Imager, or Veeam agent).
-
Boot into Safe Mode (with networking disabled):
– Windows 10/11 → Hold Shift → Power → Restart → Troubleshoot → Startup Settings → Safe Mode. - Use external scanner: Boot from a Bitdefender Rescue CD or Kaspersky Rescue Disk to prevent rootkit persistence.
-
Delete persistence:
– Registry Run keys:HKCU\Software\Classes\ms-settings\shell\open\command
(UAC bypass often left here).
– Scheduled tasks:schtasks /query /fo list
– look for random GUID tasks.
–C:\ProgramData\LgbcSys
and random GUID folders in%LOCALAPPDATA%
(common drop site). -
Clean Master Boot Record (MBR) if modified – this variant drops a pre-boot ransomnote driver, so rebuild MBR:
bootrec /fixmbr
after disinfection. - Reset Windows Defender to defaults to remove tamper-protection and restore services (rundll32 post-infection often breaks services).
3. File Decryption & Recovery
-
Recovery Feasibility: NO universal decryptor exists publicly (2024-05).
–.complete
uses ChaCha20-Poly1305 with RSA-2048 pre-encryption; keys stored server-side.
– Exception: If an offline-only key was deployed (rare, misconfig #148 case). Emsisoft leaves a beta script “completedecryptorv0.2.7.exe” under NDA with law-enforcement; vendor releases only if > 500 victims trigger a master key leak. -
Working Alternatives:
a) Restore from offline backups (preferred).
b) Windows Shadow Copies:vssadmin list shadows
– occasionally skipped during 2024-05 builds. 3C Toolbox or ShadowExplorer can recover.
c) Volume-Level Rollback: If machine snapshot through Veeam, Azure, or VMware was prior to infection, boot into recovery console → select “Restore snapshot.”
d) Incident-response partners sometimes negotiate keys at > 2 000 USD (DO NOT use attacker email overlords; route via Mandiant or chain-of-custody law-enforcement channel). -
Essential Tools / Patches:
– MS17-010 (Microsoft patch for SMB) – KB4012215.
– Exchange-proxy-rule checks: run GitHub script “ProxyShell-Test.ps1”.
– NVAccess Anti-Cryptopgraphy “HiddenTear/PYComplete-detector.py” for emergency triage.
– RDP hardening script:Set-NetFirewallRule -Name "RDP-UserMode-In-TCP" -RemoteAddress Any → [your-admin-NAT-range]
.
4. Other Critical Information
-
Unique Characteristics:
– Dual-extortion playbook: threat actors exfiltrate .SQL, .PST, and finance dirs via rclone to MEGA before encryption can succeed, then publish “proof” on dark-web auction site “CoFullData”.
– Language-aware ransom note drops: Reads OS language pack and presentsREADME_COMPLETE.txt
in victim’s locale (EN, ES, FR, DE, RU).
– SMB v4.0 propagation module: For Windows 10/11 builds post-SMBv3,.complete
embeds its own compiled srvnet.sys driver—so all recent OSes still vulnerable if patch level is below KB5014697 (June-2022). -
Broader Impact:
– Critical Infrastructure hits: Electric utility substation control LANs, 2 US-based manufacturing plants forced into Fed-Payments shutdown in March-2024.
– CrowdStrike’s 2024 Threat Report lists.complete
as top-5 variants by new infection count, surpassing LockBit spin-off groups in financial extortion totals ($27 M extorted in Q1-2024).
– Confirmed verticals: Legal (25 %), Architecture/AutoCAD firms (18 %), Healthcare clinics (14 %).
TL;DR: .complete
is an advanced Spora-derivative targeting both legacy and modern Windows installs via phishing, ProxyShell, and EternalBlue. No public decryptor as of May-2024; rely on staged off-line backups, patches, and containment playbook.