ENJEY Ransomware – Community Defense Guide
(Variant that appends “.enjey” to every encrypted file)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Every successfully encrypted file receives the SECONDARY extension
.enjey
(lower-case).
Example:Quarterly-Report.xlsx
→Quarterly-Report.xlsx.enjey
The original base name and primary extension are preserved; ENJEY simply tacks on its marker. -
Renaming Convention: No randomised prefix/suffix is added, so victims can immediately spot the compromise by the presence of thousands of “double-extension” files. Inside each folder the ransomware also drops:
–!!!_README_!!!.txt
(sometimes!!!DECRYPT-ENJEY!!!.txt
) – the ransom note.
– A second variant note called!!!_INSTR_!!!.txt
may be written into the root of every logical drive.
2. Detection & Outbreak Timeline
- First publicly confirmed submissions: 17 Mar 2023 (ID-Ransomware & VirusTotal uploads from Kazakhstan and Bulgaria).
- Recorded spike / widespread activity: April-May 2023, with continuing low-volume but geographically scattered attacks through Q4-2023 and Q1-2024.
- Tracking is complicated by the fact that ENJEY is a direct descendant of the Chaos 4.x builder, so every affiliate can “re-brand”; nevertheless, the consistent use of “.enjey” makes cluster detection possible.
3. Primary Attack Vectors
- RDP brute-force / RDP-stolen credentials → manual deployment by affiliate.
- Phishing e-mails carrying ISO, ZIP or IMG attachments that contain the Chaos/ENJEY binary disguised as a “quote.pdf.exe”.
- Malvertising / fake software cracks (Adobe, KMS, game cheats) leading to drive-by downloads.
- Exploits of public-facing services only when they are already present (Log4Shell, PaperCut, etc.) – i.e. ENJEY itself does not self-propagate, but affiliates that already own a network often drop it as a final “encryption layer” after using more sophisticated access tools.
- No SMB “worm” component – unlike Ryuk or WannaCry, ENJEY does not scan for SMB shares once inside; it simply traverses mounted logical drives and network-shares it already sees.
- Written in .NET; obfuscated with ConfuserEx → easy for defenders to unpack in a sandbox; hard for static AV to catch before execution.
Remediation & Recovery Strategies
1. Prevention (STOP THE INFECTION BEFORE IT STARTS)
✅ Disable RDP from the Internet, or at minimum enforce 2FA / gateway rate-limit / account-lockout.
✅ Patch OS & 3rd party apps ASAP – ENJEY is often dropped AFTER the affiliate exploited a n-day (Log4Shell, PaperCut).
✅ Remove default local “admin / 123456” combinations; enforce LAPS (Local Administrator Password Solution).
✅ E-mail filters: block ISO/IMG/DMG at the gateway, enable Windows “Mark-of-the-Web” warnings for downloaded executables.
✅ Application whitelisting / Windows Defender ASR rules (e.g. “Block Office apps from creating executable content”).
✅ Segment LANs and block workstation-to-workstation SMB (port 445) except to real file-servers.
✅ Comprehensive 3-2-1 backup strategy (3 copies, 2 media types, 1 off-line & off-site). Veeam, Commvault, Windows-Server-Backup → store with DIFFERENT credentials; remove Veeam GUI ports from domain-joined machines.
2. Removal (IF YOU ARE ALREADY INFECTED)
- Immediate
- Disconnect the host from the network (pull cable / disable Wi-Fi).
- DO NOT log-out or reboot until volatile evidence is captured (memory dump with Magnet RAM Capture or “winpmem” for future forensics).
- Containment
- From a clean admin workstation open WMI / PowerShell and terminate:
– Process name normallysvchosts.exe
(note “s”) ormsapp.exe
(both names hard-coded in Chaos builder). - Check the run-key (
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
) value“Windows Update”
pointing to the same .exe – delete after noting path.
- Full Eradication
- Boot from a Windows PE / Kaspersky Rescue / Bitdefencer Rescue USB and run a full scan. Any Chaos/ENJEY sample is detected generically as:
– Trojan-Ransom.Win32.Chaos, Ransom:Win32/Chaos.B, Ransom.Chaos, etc. - Remove the malware binary (usually in
%AppData%\Microsoft\Windows\ReSys\winlogon.exe
) plus its persistence registry entry. - Clear Volume-Shadow keys the ransomware deliberately blanks (
HKLM\SYSTEM\CurrentControlSet\Services\VSS\DisableShadowCopies
).
- Re-image vs Clean-up
- Because ENJEY is delivered by a human operator who may have planted backdoors, recommended path is: nuke & pave – flatten machine / server and rebuild from known-good image.
- Only then re-connect to network.
3. File Decryption & Recovery
-
Is free decryption possible?
– Unfortunately NO for the vast majority of victims.
– ENJEY is powered by Chaos-builder 4.x which, depending on affiliate settings, does one of three things:
a) Encrypts the first 2 MB only – theoretically reversible, but a 64-byte random key is encrypted with RSA-1024 (private key held by attacker).
b) Overwrites the entire file with random bytes (data-destroying, not encryption).
c) Use an RSA + Salsa20 routine with keys cleaned from memory.
– Chaos family has NO flaw; there is no offline decryptor. Any site offering “ENJEY-Decryptor.exe” for money is simply re-victimising you. -
Restoration options
-
Shadow Copies – ENJEY runs
vssadmin delete shadows /all
; however, on servers protected by “VSS Copy-only” backups or SAN snapshots you may still have recovery points. - Windows-Backup or 3rd-party backups stored on a non-mounted partition/disk.
- Cloud recycle bin (OneDrive, Google Drive, Box) – many small orgs discover weeks-old copies online.
- System Restore – Chaos does NOT encrypt .dll/.exe inside \Windows\ volume; so you can restore the OS without losing data, but user documents are still lost.
- File-carving – if you face scenario (b) above (overwrite) even forensics labs cannot help; if scenario (a) (partial encryption) photo & text files ≥ 2 MB may contain salvageable chunks – use PhotoRec or “unENJEY-ing” scripts to strip the first 2 MB and recover partial video frames. Expect corruption, but for life-or-death evidence this sometimes helps.
-
Essential Tools / Patches
– Official Chaos/ChaosDecryptor does NOT exist; only “ChaosDecryptor by Tas-IX” circulating on Telegram is fake.
– Update Windows Defender engine ≥ 1.387.1970.0 (adds enjey sig).
– Preferably deploy Microsoft’s “Security Baseline” with LSA-protection &Credential-Guard to frustrate credential dumping that precedes ENJEY.
– A patch list hit by affiliates before dropping the payload:
• Log4j CVE-2021-44228
• PaperCut MF/NG CVE-2023-27350
• Fortinet CVE-2022-40684
• Microsoft Exchange ProxyShell (CVE-2021-34523 + 34473 + 31207)
• (nothing ENJEY-specific – just the juicy doorways)
4. Other Critical Information
-
Family Relation / Unique Traits
– ENJEY is NOT a standalone codebase; it is point-and-shoot output of the “Chaos 4.x Ransomware Builder” sold on dark-web for ~$1,000. That builder markets itself as “friendlier than LockBit” for novice affiliates, leading to a scatter-gun pattern of hits rather than targeted Big-Game Hunting.
– Chaotically chosen encryption modes ⇒ some victims lose only a 2 MB header (and get ransom note), others get full file overwrite. Check a couple of files in a hex-editor; if you see plaintext past byte 2,097,152 you are in scenario (a) and recovery chances of big video archives are better.
– Does not exfiltrate data; therefore only “integrity-loss extortion”, not double-extortion.
– Hard-coded exclusion list looks like a copy-paste from an older Phobos config:
bootmgr, boot.ini, ntuser.dat, pagefile.sys, swapfile.sys, desktop.ini, autorun.inf, !README!, *.enjey, *.chaos, *.key
– Drops “proof-of-decrypt” by encrypting one file on the desktop and writing<filename>.enjey.unlocked
, but note: the same RSA keypair is used site-wide; if you pay once you still cannot decrypt other machines free of charge because the per-file symmetric keys differ.
– Observed average ransom ask: 0.15–0.3 BTC for small companies, ~1.5 BTC for servers with > 100 employees. Negotiation e-mail addresses rotate; current ones visible in the note:[email protected]
&@onionmail.org
over Tor (hxxp://enjey7wauxkckjargxmbzudjzduevkbopvm2x5lq6ys635qlbz2jcbid.onion
). -
Broader Impact
– Because builder-as-a-service lowers the entry barrier, ENJEY has become the “entry level” ransomware for cyber-criminals who cannot obtain LockBit or Hive affiliations. Expect more branding forks (observed:.chaos
,.xbet
,.axxy
,.monti
,.babyduck
). Same builder, different sticker – same decryption impossibility.
– 60–70 % of ENJEY incidents in 2023 hit MSPs in Eastern Europe who exposed RDP with “Admin/2020” passwords; the lesson is that commodity ransomware continues to devastate where fundamentals are ignored.
– Law-enforcement takedown probability is low: the author only sells the builder, never handles victim data; affiliate infrastructure hops every week.
Stay safe: patch, segment, back-up, and refuse to pay whenever you have an alternative.
If further ENJEY samples or notes emerge, submit them to:
- ID-Ransomware (https://id-ransomware.malwarehunterteam.com)
- VirusTotal with the tag
“enjey”
- CISA, FBI IC3 or your national CERT for trending analysis.