Ransomware Profile – FilesEncrypted Extension
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension added:
.filesencrypted
(lower-case, no space) - Renaming convention:
- Original name is preserved, the string
.filesencrypted
is simply appended.
Example:Quarterly-Report.xlsx
→Quarterly-Report.xlsx.filesencrypted
- No fixed e-mail address, victim ID, or random hex string is inserted between the original name and the extension (helps distinguish it from variants such as
.[bc1qxyz].filesencrypted
,.[[email protected]].filesencrypted
, etc.). - In observed samples the desktop wallpaper and ransom note are written before encryption starts, so if you suddenly see
How-to-decrypt.filesencrypted.txt
appear, assume the process is imminent and power-off immediately.
2. Detection & Outbreak Timeline
- First public submissions: 10 Sep 2021 (VirusTotal, Malshare).
- Mini-campaigns: Q4-2021 spikes in Eastern-European manufacturing and APAC MSSPs.
- Still circulating: Low-volume but steady through 2022-2023, usually piggy-backing on purchased-access rather than mass spam.
3. Primary Attack Vectors
- Purchased/RDP credentials (most common) – adversary brute-forces or buys VPN/RDP creds on Genesis/Market, then drops the payload manually.
-
Phishing with ISO/IMG containers – e-mail “invoice” contains a 1-2 MB ISO; the IMG mounts as DVD in Windows 8+; LNK inside points to
dllhost.exe
that side-loads the encryptor DLL. - VoIP spear-vishing – callers posing as the target’s IT get the employee to browse to a “new remote-support agent” which is a Cobalt-Strike beacon that stages the ransomware 24-48 h later.
- No signs of worm-like SMB/EternalBlue propagation; lateral movement is manual via
PAExec
,WMIC
, orSharpRDP
.
Remediation & Recovery Strategies
1. Prevention
- Disable RDP if unused; if required, place behind VPN with MFA, enforce “Network Level Authentication,” and set “Account lockout threshold = 5”.
- Apply the Windows patches that block common CS-beacon staging:
– CVE-2021-34527 (PrintNightmare)
– CVE-2021-26411 (IE/Edge)
– CVE-2021-40444 (MSHTML) - Mail-gateway rules:
– Block ISO, IMG, VHD, and PiF attachments at the perimeter.
– Strip external LNK, HTA, and JS inside zip. - Turn on Windows Defender’s “Block persistence through WMI event subscription” and “Disable Office applications from creating child processes” (ASR rules).
- Segment flat networks; ransomware manually hunts ADMIN$, C$, and backup servers.
- Protect backups: offline copy + immutable object-lock (AWS S3 Object Lock, Azure Immutable Blob, or WORM tapes). Veeam, Rubrik, Commvault all support immutability flags.
2. Removal / Incident Containment
Typical play-book (adapt to your IR plan):
-
Detect: Alert on mass file renames to
*.filesencrypted
, creation ofHow-to-decrypt.filesencrypted.txt
, spike inesent.dll
usage (Shadow-copy delete). - Isolate: Disable Wi-Fi, pull LAN, shut down compromised VMware port-group / VLAN. Take RAM image if you plan to hunt for BEACON config.
-
Collect evidence: Export MFT, USN journal, PowerShell ConsoleHost_history.txt, RDP event 4624/4625, NTUSER.DAT
\Software\CryptoID\
. -
Flatten & rebuild:
a. Re-image OS volume; uninfected environments can use AV/EDR quarantine (Windows Defender detects this family asRansom:Win32/FilesEncrypted.A
).
b. Change all harvested credentials, reset AD krbtgt twice (golden-ticket wipe), review Domain Admin list.
c. Patch the compromise vector (usually Exchange/RDP), enable MFA.
d. Do NOT pay and then continue using the same network – re-infection rate of manual families is ~25 % within 30 days.
3. File Decryption & Recovery
- No free decryptor presently exists. The malware uses Curve25519 (ephmeral) + ChaCha20-Poly1305; private key never leaves the attacker’s C2.
-
Volume-Shadow copies are deleted via
vssadmin delete shadows /all
,wmic shadowcopy delete
,bcdedit /set {default} recoveryenabled No
and overwritten withcipher /W
, so built-in Windows rollback is unavailable unless you had VSS excluded or protected. - Recovery paths:
- Restore from offline backups (verified, immutable).
- Leverage file-share snapshots (Synology, NetApp, Dell EMC Isilon, Windows Server 2022 “VSS for SMB”).
- “Previous Versions” via 3rd-party backup agents that keep their own snapshot chain (Acronis, Macrium, Druva).
- Data-recovery firms may negotiate for the private key if business-critical; average BTC demand observed = 1.9 – 2.4 ($60-90 k). Negotiation / remediation success is ≈ 70 % but adds weeks to downtime.
4. Other Critical Information
- Unlike automated “big-game” families (Ryuk, Conti) the
.filesencrypted
crews spend 1-3 days inside, exfil between 50 GB-1 TB via MEGASync, file.io, orrclone
to AnonFiles, then trigger encryption. Prepare for double-extortion. - The ransom note (
How-to-decrypt.filesencrypted.txt
) recommends the victim install “TOR Browser” and visit adecrypt[.]top
v3 onion domain; samples in 2023 switched tounlock[.]cyou
. Supply-chain note templates are identical to older proprietary “SunnyDay” ransomware, hinting at re-branding or affiliate sharing. - Encrypted files are not corrupt – headers receive 16-byte Poly1305 MAC, rest is stream-encrypted ChaCha20. If you ever obtain the private key, decryption is deterministic; therefore keep an encrypted sample so you can verify any promised tool.
- IOCs (refresh frequently – C2 fast-flux)
– SHA256:6f02e6…c21807
(dropper)9ab9d4…03e441
(encryptor)
– C2 (2023-04):15.235.195[.]22:443
,decrypt[.]top/upd/api.php
– Ransom e-mails:fileservice@privatemail[.]com
,unlocksupport@onionmail[.]org
- YARA (generic)
rule win_ransom_filesencrypted {
meta:
description = "FilesEncrypted ransom payload"
strings:
$s1 = "filesencrypted" wide
$s2 = "How-to-decrypt.filesencrypted.txt" wide
$k1 = { 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 } //curve25519 clamp
condition:
uint16(0) == 0x5A4D and all of them
}
Key Take-away
*.filesencrypted
is a post-compromise, hybrid-extortion threat. Blocks the easy recovery paths (VSS, services stop list, wbadmin) and exfiltrates data before it encrypts. Your best defence is layered controls before the intrusion (hard-shell remote access, MFA, e-mail filtering, EDR) and an offline, immutable backup that survives even a malicious domain-admin. A free decryptor is unlikely so invest in those fundamentals rather than hoping for a future tool. Stay safe!