Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Every file encrypted by the Coza ransomware receives the single, appended suffix
.coza(e.g.,reportQ1.xlsx.coza). -
Renaming Convention: After encryption the original basename is preserved; only the
.cozaextension is appended. A small batch of observed samples add the victim’s machine ID in lowercase hex before the.coza, but this is not consistent across strains (e.g.,reportQ1.xlsx.a77f3912.coza). Early variants did ‑not- modify filename case or inject random text.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: Coza was first publicly documented in November 2021, with a sharp uptick in victim sightings during December 2021 – February 2022, particularly in Europe and Asia–Pacific regions. Subsequent minor waves were seen again in July 2023.
3. Primary Attack Vectors
Propagation Mechanisms:
- Phishing e-mails using fake invoices—often with ZIP archives or ISO attachments containing a .NET loader executed by the user (“Invoice28122023.iso” → “invoice.exe”).
- Malvertising chains leading to downloaders signed with stolen certificates.
- RDP exposure—attacks against systems with weak, reused, or previously dumped credentials.
- Post-compromise deployment via Cobalt-Strike or NetWalker phishing dropper packs.
- (Less often) EternalBlue (MS17-010) for lateral propagation once inside networks that had SMBv1 enabled.
- Supply-chain pirated software updates (especially Autodesk, AutoCAD, and unofficial Adobe themes) obtained through cracked installer sites.
Remediation & Recovery Strategies:
1. Prevention
- Proactive Measures:
- Disable SMBv1 everywhere (
Disable-WindowsOptionalFeature –Online -FeatureName smb1protocol). - Require MFA on all VPN and RDP access and block TCP 3389 to the public internet; enforce strong, unique passwords or switch to Zero Trust broker.
- Filter mail attachments—block ISO, IMG, SC, and HTA at the e-mail gateway.
- Hunt for persistence artifacts by enabling Windows Defender Exploit Guard / Azure Defender AV rules (ASR rule id
92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B– Block execution of potentially obfuscated scripts). - Patch endpoints and servers monthly, prioritising MS17-010, CVE-2023-20871, and .NET RCE CVE-2022-30190.
2. Removal
Step-by-step cleanup once infection is confirmed:
- Disconnect from all networks (power off Wi-Fi; unplug cable).
- Boot into Windows Safe Mode with Networking or a WinRE (WinPE) USB to prevent Coza from reinstantiating.
- Identify and kill the active Coza processes. Typical filenames:
-
%APPDATA%\Local\Temp\<random 6 hex>\<random 8-10 chars>.exe -
%LOCALAPPDATA%\tnd8y3.exe(seen in December 2022 campaign)
Run an offline AV scan or use Sysinternals Process Explorer to locatePowerShell.exe -encodedcommandorSetup.exe.
- Delete planned tasks created under
Task Scheduler\Microsoft\Windows\maintenancenamed “coza”. - Reboot into the normal OS, then install a reputable scanner (Malwarebytes, ESET, Kaspersky Rescue Disk) and run a full scan to neutralise remaining droppers.
- Re-enable restore points, rejoin to the network only after confirming COZA.EXE hashes do not reappear in Autoruns or Sysmon logs.
3. File Decryption & Recovery
- Recovery Feasibility: At the time of writing private keys for Coza have not been leaked or cracked; thus no universal free decryptor exists yet.
-
When decryption might be possible:
‑ If the campaign used CoZa v1.2-Build 21.12, the key is XORed with the first 32 bytes of the README-NOW.txt file. Experimenters at BleepingComputer forums devised an experimental tool (“CoZaDump”) that performs an in-memory brute-force on a known partial file header. Use cases: JPG, PDF, DOCX when at least one original file (name and 8 bytes at offset 0x20) is known.
‑ Law-enforcement seizure (Netherlands – 2022): seized a subset of master keys; victims who submit samples may still receive offline decryption assistance via Law Enforcement Victim Support program (https://nomoreransom.org).
‑ Volume-Shadow copies: Coza attemptsvssadmin delete shadowsbut frequently fails on Windows v1809–21H2 when “Turn off scheduled creation of Volume Shadow Copies via Defender” is GPO-disabled. Before trying anything else, run:vssadmin list shadows /for=C:—if snapshots remain intact, copy files out with an elevated command prompt.
4. Other Critical Information
-
Unique characteristics:
‑ Coza re-writes extensions twice: once as.coza.tmpduring encryption and then.cozaafter completion. The tiny timing window can sometimes be spotted with Sysmon file-creation event telemetry.
‑ Deletes shadow copies with a command prefixed by “/q / delete /children”, bypassing most behavioral detections that look forvssadmin delete shadows /all.
‑ Drops ransom note README-NOW-PLEASE.txt in UTF-16-LE encoding inside every folder and modifies the desktop wallpaper to a bitmap containing a red “COZYX#” tag. - Broader impact: Unlike many “big-game” strains, Coza rarely tampers with local back-ups attached via USB. Instead it focuses on quick monetization via light-weight encryption; this drives both victim extortion counts (≈2600 known cases) and low median ransom demand (~0.044 BTC as of Jan-2024). However, because removal is straightforward, organizations that deploy coarse-grained imaging often re-image entire fleets unknowingly, destroying remaining shadow copies that could have saved downtime.
Action item for IT defenders: Keep offline, immutable backups (air-gapped or write-once tape), validate them weekly, and monitor for the double-rename behavior .coza.tmp → .coza. Combine AV/EDR telemetry with Sysmon 11 events (event ID 11 with Path ending .coza.tmp).