{"id":1211,"date":"2024-08-31T09:47:08","date_gmt":"2024-08-31T09:47:08","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1211"},"modified":"2025-07-28T13:56:02","modified_gmt":"2025-07-28T13:56:02","slug":"tears-for-fears-dcry-ransomware-makes-you-want-to-shout-shout-let-it-all-out","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/tears-for-fears-dcry-ransomware-makes-you-want-to-shout-shout-let-it-all-out\/","title":{"rendered":"Tears for fears: Dcry ransomware makes you want to shout, shout, let it all out"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"255\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs_feat-image.jpg\" alt=\"\" class=\"wp-image-1228\" style=\"width:401px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Ransomware has been hitting the headlines lately and the latest variant to make the rounds has been dubbed \u2018Dcry\u2019. This strain is interesting as it encrypts data with .qwqd extensions &nbsp;and propagates through fake software updates which exploit software vulnerabilities to infect the target system.&nbsp;<br><br>Let\u2019s take a closer look:<br><br><strong>File details<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<\/td><td>Dcry.exe<\/td><\/tr><tr><td><strong>File type<\/strong><\/td><td>PE (portable executable) file<\/td><\/tr><tr><td><strong>Md5 hash<\/strong><\/td><td>4067933609a560b044fd43800f37c627<\/td><\/tr><tr><td><strong>SHA1 hash<\/strong><\/td><td>b06e25ff233ecbefe5266e97651d63a507578932<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><\/p>\n\n\n\n<p>The first thing static analysis showed us was that Dcry has a suspicious entry point:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"607\" height=\"47\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image1.png\" alt=\"\" class=\"wp-image-1212\"\/><\/figure>\n\n\n\n<p>A number of Import Address Table alerts then scan the system for computer name, startup information, %TEMP% directory, debuggers and the presence of a virtual machine, etc.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"271\" height=\"405\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image2.png\" alt=\"\" class=\"wp-image-1213\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"304\" height=\"464\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image3.png\" alt=\"\" class=\"wp-image-1214\"\/><\/figure>\n\n\n\n<p>Having completed this process, the malware then drops a \u201cmessage.vbs\u201d file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"243\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image4.png\" alt=\"\" class=\"wp-image-1215\"\/><\/figure>\n\n\n\n<p>&nbsp;Below, we can see this contains the \u2018ransom letter\u2019:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"137\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image5.png\" alt=\"\" class=\"wp-image-1216\"\/><\/figure>\n\n\n\n<p>&nbsp;Now the encryptions begins via .qwqd extensions and the execution of a .vbs file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"925\" height=\"171\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image6.png\" alt=\"\" class=\"wp-image-1217\"\/><\/figure>\n\n\n\n<p>After performing the encryption, Dcry attempts to delete the volume shadow copies present in the victim\u2019s machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"200\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image7.png\" alt=\"\" class=\"wp-image-1218\"\/><\/figure>\n\n\n\n<p>And then it initiates a ping request:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"133\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image8.png\" alt=\"\" class=\"wp-image-1219\"\/><\/figure>\n\n\n\n<p><strong>Dynamic Analysis<\/strong><\/p>\n\n\n\n<p>Executing the sample gives us a prompt with a key and a value number:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"598\" height=\"277\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image9.png\" alt=\"\" class=\"wp-image-1220\"\/><\/figure>\n\n\n\n<p>When we press \u2018ok\u2019 it executes and, as seen below, it doesn\u2019t have a valid signature:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"857\" height=\"697\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image10.png\" alt=\"\" class=\"wp-image-1221\"\/><\/figure>\n\n\n\n<p>A .vbs file is dropped into the user\u2019s system after which the encryption process starts:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"543\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image11-1024x543.png\" alt=\"\" class=\"wp-image-1222\"\/><\/figure>\n\n\n\n<p>Next, the ransomware message is displayed:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"655\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image12-1024x655.png\" alt=\"\" class=\"wp-image-1223\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image12-1024x655.png 1024w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image12-280x180.png 280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"312\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image13.png\" alt=\"\" class=\"wp-image-1224\"\/><\/figure>\n\n\n\n<p>As a result, the following files were dropped onto the user\u2019s system, all files were encrypted with .qwqd extensions:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image14-1024x683.png\" alt=\"\" class=\"wp-image-1225\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"673\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image15-1024x673.png\" alt=\"\" class=\"wp-image-1226\"\/><\/figure>\n\n\n\n<p>The following registry entries were also created by Dcry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/dcry-ransomware-shout_labs-image16-1024x307.png\" alt=\"\" class=\"wp-image-1227\"\/><\/figure>\n\n\n\n<p><strong>Network activities<\/strong><\/p>\n\n\n\n<p>No IP\/Domains involved<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Once Dcry successfully gains a foothold on a victim machine, it drops a \u201cmessage.vbs\u201d on execution, after which it performs a full system encryption with .qwqd extensions.<\/p>\n\n\n\n<p>If the current tide of ransomware is any indication, we\u2019re nowhere near the high-water mark. One of the best measures you can take to protect yourself from these attacks is to backup critical files at regular intervals. If you do happen to fall victim, then you can always restore your files from the most recent back up.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware has been hitting the headlines lately and the latest variant to make the rounds has been dubbed \u2018Dcry\u2019. This strain is interesting as it encrypts data with .qwqd extensions \u00a0and propagates through fake software updates which exploit software vulnerabilities to infect the target system.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":1228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1211"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1211\/revisions"}],"predecessor-version":[{"id":4441,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1211\/revisions\/4441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1228"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}