Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (2024)

Recently, the SonicWall Capture Labs Research team analyzed a ransomware called Vohuk. Which uses the genuine Windows tool Cipher.exe to overwrite the deleted files which make the recovery of the files impossible.

Cipher.exe is a command-line tool that can be used to manage encrypted data by using the Encrypting File System (EFS).Whenever any files or folder is deleted the data is not deleted, only the space on the disk that was occupied by the deleted data is deallocated. Until the space is overwritten, there is a possibility that the deleted data can be recovered using a low-level disk editor or data-recovery software. Administrators uses the Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system. In Encrypting process windows makes a backup copy of the file. So the data isn’t lost if an error occurs during the encryption process. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data isn’t removed until it has been overwritten. So to prevent unauthorized recovery of such data windows has provided the tool called Cipher.exe.

Ransomware uses this feature of Cipher.exe to overwrite the deleted data so as to make the recovery of the files impossible.

Infection Cycle:

At the start of the execution it creates a named mutex “Global\\VohukMutes” to avoid different instance of Vohuk Ransomware running on the same system.
Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (1)

It creates a folder on root drive C:\\ProgramData\\Vohuk at below location and copies itself as App.exe and also creates a Log file which is used for logging it’s activities.

At the start of the Log.txt file it mentions the Name as VohukCrypter V1.51 and its version number.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (2)

The Ransomware collects the command-line options if any passed at the time of execution. It checks for the following string options in the command line parameter and depending upon the parameter provided it may change its behaviour.

‘/NOKILL’
‘/NOMOUNT’
‘/NOEMPTY’
‘/LAN’
‘/NOLOCAL’
‘/NONETDRIVE’
‘/NOSTARTUP’
‘/FULL’
‘/FAST’
‘/PATH=’

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (3)

Ransomware calls the GetSystemInfo API and gets the Number of processor presents on the system

The number of threads created is dependent on the number of processors, with one thread being created for each processor.
If the number of processors are more than 64 then maximum thread created by the Ransomware is 64 threads.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (4)

Before encrypting the files it first empties the files present from all Recycle Bins on all drives.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (5)

It launches the command prompt process and Vssadmin command is passed to the command prompt to delete the volume shadow copies.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (6)

Ransomware kills the below running process if found running on the system. So that it is able to encrypt the files which are currently in use.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (7)

It also enumerates the services and kills below listed services and also its dependent services if found running on the system.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (8)

The Ransomware use multi-threading by using APIs CreateIoCompletionPort(), PostQueuedCompletionStatus(), GetQueuedCompletionPort() to handle multiple files concurrently and thread priority is also set to high for quick encryption.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (9)

Ransomware avoids encrypting the files with below filename.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (10)

And it also avoids encrypting the files with below extension; so that the common functioning of the Operating system is not hampered.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (11)

Ransomware checks the file attributes before encryption, if the attribute is READ_ONLY then it resets the READ_ONLY attribute.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (12)

It encrypts the files, renames them and adds the extension “.Vohuk” and drops a ransom note file named R3ADM3.txt,in each folder.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (13)

Once all the encryption process is completed it uses genuine Windows tool Cipher.exe on all drives to overwrite the deleted data.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (14)

The ransomware also replaces the desktop wallpaper with its own.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (15)

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: VohukCrypt.RSM (Trojan)

This threat is also detected bySonicWall Capture ATP w/RTDMIand theCapture Clientendpoint solutions.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (16)

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Vohuk Ransomware uses Cipher.exe making files recovery impossible | SonicWall (2024)

FAQs

What is cipher EXE used for? ›

Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system. They can also use it to view the encryption status of files and folders from a command prompt.

How to use cipher exe to overwrite deleted data in Windows? ›

To overwrite the deallocated data:
  1. Quit all programs.
  2. Click Start, click Run, and type cmd, and then press ENTER.
  3. Type cipher. /w:'folder', and then press ENTER, where folder is optional and can be any folder in a local volume that you want to clean. For example, the.

How do you see what ciphers are being used? ›

Find the cipher using Chrome
  1. Launch Chrome.
  2. Enter the URL you wish to check in the browser.
  3. Click on the ellipsis located on the top-right in the browser.
  4. Select More tools > Developer tools > Security.
  5. Look for the line "Connection...". This will describe the version of TLS or SSL used.
Mar 1, 2023

How do I disable ciphers in Windows? ›

How to Remove CBC Ciphers
  1. Group Policy. Create new or edit existing GPO. ...
  2. PowerShell. The command Disable-TlsCipherSuite can be used to remove specific CBC ciphers. ...
  3. IISCRYPTO. Manually uncheck the CBC ciphers which you want to remove and click Apply.
  4. Modify registry keys (not advised)

How do I recover an overwrite file? ›

Restore Previous Versions (PC) – In Windows, if you right-click on a file, and go to “Properties,” you will see an option titled “Previous Versions.” This option can help you revert to a version of your file before the overwrite occurred, allowing you to get your data back.

How deleted files can be recovered in Windows operating system? ›

Basic steps

Press the Windows key, enter Windows File Recovery in the search box, and then select Windows File Recovery. When you are prompted to allow the app to make changes to your device, select Yes. There are 2 basic modes you can use to recover files: Regular and Extensive.

Which command Windows can be used to recover accidentally deleted files? ›

The UNDELETE command can only recover deleted files if no new files or changes have been made on the disk since the deletion. Therefore, if you accidentally delete a file that you want to keep, stop what you are doing immediately and use the UNDELETE command to retrieve the file.

What is the purpose of a cipher? ›

Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext using a key to determine how it is done.

What is the use of a cipher? ›

Ciphers are commonly used to encrypt written information. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates."

What is a cipher disk used for? ›

use in enciphering

Other simple devices known as cipher disks were used by European governments for diplomatic communications by the late 1400s. These devices consisted of two rotating concentric circles, both bearing a sequence of 26 letters.

What does a cipher machine do? ›

Cipher devices or machines have commonly been used to encipher and decipher messages. The first cipher device appears to have been employed by the ancient Greeks around 400 bce for secret communications between military commanders.

Top Articles
pCloud Reviews, Pricing, Pros & Cons 2024
What Can Buddhism and Minimalism Teach Us
Encore Atlanta Cheer Competition
Kathleen Hixson Leaked
El Paso Pet Craigslist
12 Rue Gotlib 21St Arrondissem*nt
Pga Scores Cbs
Craigslist In South Carolina - Craigslist Near You
Apnetv.con
Palace Pizza Joplin
Tabler Oklahoma
Erskine Plus Portal
True Statement About A Crown Dependency Crossword
Cape Cod | P Town beach
Turning the System On or Off
What Happened To Maxwell Laughlin
Vcuapi
Summer Rae Boyfriend Love Island – Just Speak News
Illinois Gun Shows 2022
Nhl Wikia
Iu Spring Break 2024
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Roof Top Snipers Unblocked
623-250-6295
Axe Throwing Milford Nh
*Price Lowered! This weekend ONLY* 2006 VTX1300R, windshield & hard bags, low mi - motorcycles/scooters - by owner -...
Graphic Look Inside Jeffrey Dahmer
zom 100 mangadex - WebNovel
Intel K vs KF vs F CPUs: What's the Difference?
Pfcu Chestnut Street
Current Time In Maryland
A Grade Ahead Reviews the Book vs. The Movie: Cloudy with a Chance of Meatballs - A Grade Ahead Blog
Elanco Rebates.com 2022
Amici Pizza Los Alamitos
Craigslist Neworleans
#1 | Rottweiler Puppies For Sale In New York | Uptown
Trap Candy Strain Leafly
Topos De Bolos Engraçados
My Locker Ausd
Tricia Vacanti Obituary
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Petra Gorski Obituary (2024)
Avatar: The Way Of Water Showtimes Near Jasper 8 Theatres
Interminable Rooms
La Qua Brothers Funeral Home
Meet Robert Oppenheimer, the destroyer of worlds
Secrets Exposed: How to Test for Mold Exposure in Your Blood!
Bbwcumdreams
Sml Wikia
Itsleaa
211475039
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 5772

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.