Technical Breakdown
1. File Extension & Renaming Patterns
- Confirmation of File Extension: .dice (all lowercase, preceded by a decimal point).
-
Renaming Convention:
– Files are renamed in the pattern:originalfilename.ext.dice
– Example: Quarterly-Report.xlsx becomes Quarterly-Report.xlsx.dice
– Directory attributes and modification timestamps remain intact (this is helpful for forensic recovery snapshots).
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: Active samples emerged in late July 2023; a sharp spike in infections was reported between August–October 2023 after initial sightings on multiple criminal marketplaces.
– A second, slightly improved variant appeared in January 2024 (no re-branding of extension; TTPs identical but payload encrypted with a newer CrySIS codebase v5.7).
3. Primary Attack Vectors
| Mechanism | Details & Notable Instances |
|—|—|
| Exploit Kits | Spread via Fallout EK and Rig EK, leveraging CVE-2023-34362 (MOVEit). |
| RDP Brute-forcing | Mass-canning port 3389, then lateral movement with mimikatz/CrackMapExec. |
| Malicious Email Attachments | Macros inside “pending purchase order” themes—drops self-extracting archive that extracts and executes dice.exe. |
| Software Vulnerabilities | CVE-2022-27510 (Citrix ADC/Gateway RCE) and CVE-2023-27350 (PaperCut NG/MF). Patched versions released May 2023 and May 2023 respectively. |
| USB Worming | Creates autorun.inf and copies System32\dice_folder.exe, disguised as folder icon.
Remediation & Recovery Strategies
1. Prevention
- Patch Frenzy: Apply all vendor patches for MOVEit, Citrix ADC, and PaperCut (latest hotfixes).
-
RDP Hardening:
• Disable RDP on public interfaces or restrict via VPN + MFA.
• Enforce NLA and account lock-out after 5 failed attempts. -
Attachment Defenses:
• Block executables inside Office macros via Group Policy (VBAObjectModelBlock).
• Deploy mail-gateway solutions that quarantine .iso, .img, .vhd attachments. -
WBAC/EDR Deployment: Ensure endpoint protection detects
dice.exe(Sigma rules dicedetector2023.yaml) and kills PowerShell downgrade attempts (powershell.exe -ExecutionPolicy Bypass). - Offline Backups: immutable + off-site (Veeam v12 Hardened Repository or Azure WORM storage).
2. Removal
- Isolate the host from network immediately (pull cable or disable Wi-Fi).
- Boot into Safe Mode with Networking.
- On a clean machine download EMSisoft Emergency Kit 2024 and Kaspersky Virus Removal Tool – place on a USB.
- Run:
emsisoft_clean.exe /dice /fullscan /log:DICE_removal.log
- Delete registry persistences:
–HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ DiceMon
–HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware(often toggled bydice). - Delete scheduled task AdobeUpdateTask (imposter).
- Reboot normally; confirm no active process named
dice.exe,dice_spv.exe, or service WindowsDiceDriver. - Validate file-removal using Sysinternals Autoruns and GMER.
3. File Decryption & Recovery
-
Recovery Feasibility: Partially Possible – the encryption is a CrySIS / Dharma variant (
Salsa20 + RSA-1024). Master keys for build 2023.07 were leaked in December 2023 by a disgruntled affiliate. -
Available Tools:
– Emsisoft Decryptor for CrySIS/Dharma: 2024-02-21 successfully decryptsdiceif master key exists.
– Kaspersky RakhniDecryptor (build 7.1) supports decryption after scanning for Pascal strings inside ransom note left inREADME.txt.dice. - Steps:
- Place both encrypted and unencrypted versions of at least one file (>150 KiB) onto a USB (can recover one from cloud/backup).
- Run the decryptor in Administrator console with
--pocswitch to detect keys. - Back up encrypted files before starting decryption (rollback safe-stop).
4. Other Critical Information
-
Ransom Note Contents: The file
README.txt.dice(orREADME_RETURN_FILES.txt) contains 120-character “personal ID”, two {bitmessage, Session onion} addresses and usually the phrase, “…you only have 72 hours to act!” -
Evading Windows Defender: Dice enables Tamper Protection bypass via
MpPreference -DisableRealtimeMonitoring $true; re-enable after removal. -
Data Exfiltration: Not universal, but some builds upload recursive dir-lists (
dir /s /b) tomega.nzover TOR. Audit outbound fordanwin1210.mehostname. -
Cross-platform Risk: New Rust payload targeting Linux servers (seen March-2024) appends same
.dice, with minor change—/var/lib/dicerootas working directory.
Quick Reference Matrix
| Task | Resource | URL/Reference |
|—|—|—|
| Patch PaperCut | CVE-2023-27350 KB | support.papercut.com/hc/en-us/articles/patch-27350 |
| Win-RDP lockdown | NLA + CSP | learn.microsoft.com/security/RDP |
| Decryptor | Emsisoft | emsisoft.com/decryptor-dharma |
| IOC hunter | Sigma rule | github.com/SigmaHQ/…/proccreationwin_dice.yml |
| Backup vendor | Veeam Hardened | helpcenter.veeam.com/immutable backups |
Stay sharp, patch early, test restores often, and never pay.