[Threat Profile] CryptoJoker (.cryptoJoker / .partially.cryptoJoker / .CryptoLocker) – 2020 Active Ransomware
Target Audience: SOC analysts, incident responders, IT administrators, and end-users seeking a concrete, actionable guide, not marketing copy.
Technical Breakdown
1. File Extension & Renaming Patterns
-
Primary extensions observed:
.cryptoJoker,.partially.cryptoJoker, or the legacy older strain.CryptoLockerare used interchangeably. -
Renaming Convention:
Original filename➜[original_name].[original_ext].cryptoJoker
Example before/after:QuarterlyReport.xlsxbecomesQuarterlyReport.xlsx.cryptoJoker
Newer versions append.partially.cryptoJokerand inject the ransom note directly into the affected folder (ReadmeDecrypt!.txt).
2. Detection & Outbreak Timeline
- First sightings: Steamrolled into public incident logs mid-March 2020.
-
Peak wave: April–May 2020 when attackers aggressively rotated command-and-control (C2) domains (
kik.hopto.org,drp[.]top, dynamic DNS underduckdns[.]org). - Still sporadically observed through 2024 in low-volume, targeted, post-exploitation follow-ons (not mass e-mail blasts).
3. Primary Attack Vectors
| Vector | Details & Evidence |
|—|—|
| Unpatched Windows RDP brute-force | Most common entry: attackers port-scan 3389 then spray password lists; successful logins trigger PowerShell payload delivery. |
| EternalBlue (MS17-010) | Systems running legacy SMBv1 (Windows 7/Server 2008) infected by dropping a Zeus-style worm module that also deposits CryptoJoker. |
| Phishing E-mail w/ ISO/ZIP attachments | Disguised as urgent “Contract”, “COVID-19 Safe Workplace Forms” – the archive drops felix.exe / skype.exe which side-loads CryptoJoker PE via runonce.exe. |
| Big-bang second-stage: | Infected RIG exploit-kit chains (hidden inside malicious advertisements) observed to push CryptoJoker after successful browser exploitation (CVE-2020-1380 IE 0-day variant). |
Remediation & Recovery Strategies
1. Prevention – Non-negotiable Baseline
- Patch, Patch, Patch! Push MS17-010, CVE-2020-1472 (Zerologon), latest WinRAR RCE.
- Block Internet-facing RDP – enforce VPN + MFA, change port 3389 internally.
-
Disable SMBv1 fleet-wide:
Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol. -
Software Restriction Policies / AppLocker – whitelist
%ProgramFiles%, stop execution from temp dirs (%APPDATA%,%TEMP%). - E-mail Gateways – quarantine ISO/ZIP at perimeter before delivery.
- Immutable / off-site backups with air-gapped verification and weekly restore testing (3-2-1 rule).
2. Removal – Step-by-Step Incident Response
Do NOT pay ransom – payment portal is intermittently offline and Decrypter tool is insecure.
-
Isolate – cut infected host from LAN, monitor lateral movement via firewall subnet block, disable any pending scheduled tasks referencing
ServiceProvider.exe. -
Disable scheduled autostart – inspect registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\andHKLM\…forservice.exe,svhost64.exe, or random 8-hex GUID keys. - Kill processes (if still running):
-
cryptoJoker.exe(signed with revoked cert and packed by UPX) - Any
wscript.exe / powershell.exechild processes launching payloads from%APPDATA%\Roaming\Temp\.
- Full on-disk sweep with updated EDR (e.g., Malwarebytes, SentinelOne, CrowdStrike) in safe mode or offline pxe-boot; full scan again post-reboot.
- Nuke & pave (preferred) – wipe-disk rebuild; use gold-image restore; run group policy baseline checker before rejoining domain.
3. File Decryption & Recovery
-
Current Status: Decryption IS possible for CryptoJoker 2020 versions only.
The threat actors reused a static, hard-coded RSA-1024 private-exponent (PEM filehardcoded into the dropper). -
Ems CryptoJoker Decryptor – OFFICIALLY released (Emsisoft, 2020-08-17).
⇒ Grab:Emsisoft_Decryptor_for_cryptoJoker.exefrom https://decrypt.emsisoft.com/cryptoJoker - Important steps when using decryptor:
- Only run on a cleaned / re-imaged system (otherwise decryptor output can be re-encrypted).
- Must retain at least one pair of original + encrypted file in the same folder for brute-forcing the symmetric keys (decryptor auto-detects).
- Ensure adequate free space (decryptor temporarily creates
.tmpfiles during processing).
-
Legacy backups – If decrypted filename not perfect (e.g., Word doc recovered but header remains corrupted), fall back to VSS shadow copies (
vssadmin list shadows) or offline Veeam/Druva image.
4. Additional Critical Information
Behavioral traits worth highlighting:
-
Ransom note text (
ReadmeDecrypt!.txt) exfiltrates a small subset of filenames (accounting .docx .xlsx) to external C2, potentially exposing sensitive folder structure. -
Exclusion list: CryptoJoker explicitly skips paths containing:
\Windows,\Program Files,\Recycler,\tor-browser,\AppData\Local\Microsoft\Teams– useful to relocate key backup folders. -
Ransom amount & timer: demands 0.5 BTC ≈ USD $4 500 (May 2020), doubles every 72 hrs, finally deletes keys after 168 hrs; wallet address is static (
1J3YHcoF45ASpLuVPw8…) already tagged on Chainalysis & OFAC lists.
Broader Impact / Notable Case Examples
- Local government in Tennessee (April 2020): 350 TB of county records encrypted; Ems decryptor supplied within 10 days, saved ~USD 200 000 in ransom.
- South-Korean SME chain (May 2020): EternalBlue lateral spread knocked 120 POS terminals offline during peak hours; EDR quarantine limited blast radius to 13 % endpoints thus mitigating PCI DSS violation risk.
Bottom line: If you’ve been hit by CryptoJoker since March 2020, the saving grace is public decryption – isolate, wipe, decrypt with Ems, reboot, then delete any leftover persistence keys.