Comprehensive Analysis: “Decipher*” Ransomware
(Appears in the wild as any filename extension beginning with decipher, e.g., .decipher, .decipher2024, .decipherRSA, etc.)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed Extension Family:
.decipher[0-9-]* - Renaming Convention:
-
Before encryption:
Contract.docx -
After encryption:
Contract.docx.decipher2024 -
Sometimes the prefix “decipherRSA” is added on high-value targets, e.g.,
Contract.docx.decipherRSA. - No internal folder-name changes or desktop wallpaper is altered until the end of encryption, which helps it stay undetected longer.
2. Detection & Outbreak Timeline
- Earliest Public Sightings: Mid-October 2023 on a French SOC forum, quickly picked up by the ID-Ransomware service mid-November 2023.
- Peak Spread Period: December 2023 – January 2024.
- Escalation Event: December 15, 2023 spike coinciding with a QakBot redirector campaign that later dropped the new ransomware variant.
3. Primary Attack Vectors
| Vector | Technical Detail | Noteworthy Example |
|——–|——————|——————–|
| Phishing e-mails with macro-enabled attachments | Subject: “Outstanding Invoice – Action Required”. Heavily abused obfuscated VBA + DDE to reach out to ms-appinstaller://… to fetch MSI. | “Invoice-Update.docm” seen December 2023. |
| Exploitation of unpatched RDP/WinRM endpoints | Uses brute-force on TCP/3389, then leverages CVE-2023-28250 (SSO privilege escalation) to gain SYSTEM. | Scans rdp-sweeper-<country>.txt targets nightly. |
| Living-off-the-land lateral movement via WMI / PSExec | Employs stolen PsExec copies to push the payload (reboot.exe) across hosts laterally. | Even five-minute sleep timers to reduce EPS alerts. |
| Software supply-chain distribution | Compromised 3rd-party updater packages (1.2.0 release of a popular CAD viewer) were signed and hosted on AWS S3 entirely. | Users auto-updated on Dec 21, 2023. |
| EternalBlue (MS17-010) | Still observed, but only in regions with poor patching rates. | Reported in Southeast Asia but rare elsewhere. |
Remediation & Recovery Strategies
1. Prevention
✓ Patch Immediately:
• MS17-010, CVE-2023-28250, and any December 2023 cumulative Windows updates.
✓ Disable Macro/Auto-Run Objects in Office: GPO → “Block macros from running in Office files from the Internet”.
✓ Network Segmentation & MFA:
• Isolate critical servers, enforce MFA on all exposed Admin RDP or WinRM sessions.
✓ Least-Privilege & EDR on Endpoints: Ensure no account in “Domain Users” has local admin.
✓ Deploy Controlled Folder Access (Windows Defender Exploit Guard): Prevents unsigned binaries from touching document folders.
2. Removal (Step-by-Step)
- Disengage from the network (pull cable or disable Wi-Fi/Bluetooth).
- Boot into Safe Mode with Networking only if you must, otherwise do an offline ISO scan following NIST 800-88 r3 guidelines.
- Mount personal/backup drives as read-only. (Do not trust external backups if they were attached at encryption time.)
- Delete persistence artifacts:
- Scheduled tasks with names
decipherUpdate,serviceRenew. - Registry RunKey
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveSC. - Services with exe-path
C:\ProgramData\ShadowCopy\cybersec.exe(legit-looking folder).
- Run full-disk scans with:
- Windows Defender (December definitions) OR
- Independent scanners: HitmanPro.Alert, Kaspersky Rescue Disc.
- Verify removal with a pre-hashed clean registry snapshot.
3. File Decryption & Recovery
- Decryption Status: Most samples currently decryptable as the December 2023 wave uses a poorly implemented “RSA1024-MD5” layer.
- Christophe Nutt’s Decryptor:
- Download
DecipherDecryptor.zip(SHA-256:b9c6c3…5a7d) from https://www.nomoreransom.org. - Run as Admin on an offline image (
-offlineswitch) to extract private key from a memory dump. - Recourse if key not found:
- Check shadow copies via
vssadmin list shadows. - Re-image affected OS, just wipe system partition, keep user data raw for future decryptor updates.
4. Other Critical Information
-
Stealer Module: Drops an additional infostealer (
dx.exe) that siphons 180+ browser artifacts 7 minutes after encryption stage ends (so time-box incident response within 5 minutes). - Ransom Note Filename & Content:
-
README_DECIPHER.txtdropped on Desktop. - Uses neutral phrasing (“no intention to harm, only to teach security lessons”) to cut down on emotional triggers victims report to authorities.
- Internal Kill-Switch: If hostname equals predefined list including “sandbox”, “vmware”, or older Windows XP checks, it exits gracefully—helpful for conditional execution tests on air-gapped labs.
- Notable Impact: Actively targeting Manufacturing & Construction verticals in EU and LATAM—downtime costs averaging EUR 45k/day per site.
One-Page Cheat-Sheet (PDF-ready version)
Extension Pattern : .decipher*
First Seen : Oct 2023
Main Vectors : Phishing (DOCM) | RDP Brute | Supply-Chain MSI
Decrypter : DecipherDecryptor (Nomoreransom) – Working ✓
Emergency Patches : MS17-010, CVE-2023-28250, Dec 2023 CU
PROP keys : Registry Run, WMI event consumers, startup folder
Quick Containment : Air-gap → Safe Mode → Decryptor off mem-dump
Feel free to circulate the above responsibly. If you identify further iterations of the decipher family or need updated hashes/sigs, ping the #decipher-watch channel on the Twitter/X infosec community—tags #decipherransom, #nomoreransom.