{"id":2466,"date":"2024-09-25T18:28:11","date_gmt":"2024-09-25T18:28:11","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2466"},"modified":"2025-07-29T03:50:18","modified_gmt":"2025-07-29T03:50:18","slug":"cyron-the-latest-player-in-the-ransomware-game","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/cyron-the-latest-player-in-the-ransomware-game\/","title":{"rendered":"Cyron: The latest player in the ransomware game"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"525\" height=\"350\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/padlock-lock-chain-key-39624-1.webp\" alt=\"\" class=\"wp-image-2492\"\/><\/figure>\n<\/div>\n\n\n<p>Yet another strain of Ransomware has been discovered plaguing victims, highlighting how popular this malware flavour has become with criminals. This time around, the strain has been dubbed \u2018Cyron\u2019 as it encrypts all user files with a .cyron extension before turning off the system and finally making the desktop un-usable.<br><br>Cyron is distributed primarily via spam mails and malicious email attachments. The ransomware message demands a 50 euro payment via PaySafeCard to restore user files.<br><br><strong>Delivery:<\/strong> While this new strain spreads mainly through email attachments, the attachments themselves vary widely. We have so far seen loaders, droppers, Trojans and malicious macros in Microsoft Office documents used to deliver the payload.<br><br>Additionally, Cyron can also be present in the form of a JavaScript code embedded with malicious links.&nbsp;<br><br><strong>File Details:<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><br>File Name<br><\/td><td><br>Cyron.exe<br><\/td><\/tr><tr><td><br>File type<br><\/td><td><br>Portable Executable (PE) file<br><\/td><\/tr><tr><td><br>Md5 hash<br><\/td><td><br>ff9dc25128897a3f1a4659422b6f0ada<br><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis:<\/strong><br><br>Below we see the registry keys the malware deletes upon execution:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"268\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-1-1024x268.webp\" alt=\"\" class=\"wp-image-2468\"\/><\/figure>\n\n\n\n<p>During this process, it drops an error.pdb file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-2-1-1024x188.webp\" alt=\"\" class=\"wp-image-2469\"\/><\/figure>\n\n\n\n<p>Next, Cyron gathers information about the victim PC using strings like get_count, get_capacity, get_Item, and get_User \u2013 the images below show the complete set of strings. Once complete, Cyron automatically saves its settings using the AutoSaveSettings string, before powering off the target machine using the ShutdownMode string:\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"488\" height=\"306\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-3.webp\" alt=\"\" class=\"wp-image-2470\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"637\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-4-1.webp\" alt=\"\" class=\"wp-image-2471\"\/><\/figure>\n\n\n\n<p><img decoding=\"async\" src=\"\" alt=\"\">Below we see the specific strings responsible for encrypting the victim\u2019s data:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"267\" height=\"611\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-5-1.webp\" alt=\"\" class=\"wp-image-2472\"\/><\/figure>\n\n\n\n<p>Cyron also drops the two below files, which we believe could allow the attackers to execute malicious functions in memory locations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"86\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-6-7.webp\" alt=\"\" class=\"wp-image-2473\"\/><\/figure>\n\n\n\n<p>\u00a0<strong>Code Analysis:<\/strong><br><br>The following code analysis shows Cyron encrypting the victim\u2019s Desktop files: \u00a0<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"278\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-7-2-1024x278.webp\" alt=\"\" class=\"wp-image-2474\"\/><\/figure>\n\n\n\n<p><br><img decoding=\"async\" src=\"\" alt=\"\">Using the below functions:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"741\" height=\"617\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-8-1.webp\" alt=\"\" class=\"wp-image-2475\"\/><\/figure>\n\n\n\n<p><br><br>Next, all files in the \u201cDownloads\u201d folder are also encrypted:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"182\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-9-1024x182.webp\" alt=\"\" class=\"wp-image-2476\"\/><\/figure>\n\n\n\n<p><br>Here we see the creation of the encryption key:\u00a0<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"831\" height=\"333\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-10.webp\" alt=\"\" class=\"wp-image-2477\"\/><\/figure>\n\n\n\n<p><img decoding=\"async\" src=\"\" alt=\"\">Cyron also checks the computer name, OS, and antivirus installed on the target machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"915\" height=\"134\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-11.webp\" alt=\"\" class=\"wp-image-2478\"\/><\/figure>\n\n\n\n<p><br>Before contacting the following domain:\u00a0<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"321\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-12.webp\" alt=\"\" class=\"wp-image-2479\"\/><\/figure>\n\n\n\n<p>Below, we see the domain has hosted malicious content in the past:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-13-1024x481.webp\" alt=\"\" class=\"wp-image-2480\"\/><\/figure>\n\n\n\n<p>The next few images show the creation of the ransom message:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"921\" height=\"543\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-14.webp\" alt=\"\" class=\"wp-image-2481\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"617\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-15-1024x617.webp\" alt=\"\" class=\"wp-image-2482\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"783\" height=\"232\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-16.webp\" alt=\"\" class=\"wp-image-2483\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"163\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-17.webp\" alt=\"\" class=\"wp-image-2484\"\/><\/figure>\n\n\n\n<p><img decoding=\"async\" src=\"\" alt=\"\">Now we have the final steps of Cyron\u2019s installation:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"863\" height=\"631\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-18.webp\" alt=\"\" class=\"wp-image-2485\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"625\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-19.webp\" alt=\"\" class=\"wp-image-2486\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"345\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-20.webp\" alt=\"\" class=\"wp-image-2487\"\/><\/figure>\n\n\n\n<p><br>The following files are then dropped:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"563\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-21-1024x563.webp\" alt=\"\" class=\"wp-image-2488\"\/><\/figure>\n\n\n\n<p><br><br>Which encrypts all files on the target machine with the .cyron extension\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"127\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-22.webp\" alt=\"\" class=\"wp-image-2489\"\/><\/figure>\n\n\n\n<p><br><br>As an interesting side note, we also witnessed some VM detection techniques. These allow Cyron to avoid executing if it is opened in a sandbox environment:\u00a0<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"\" alt=\"\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"744\" height=\"358\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-23.webp\" alt=\"\" class=\"wp-image-2490\"\/><\/figure>\n\n\n\n<p>Once Cyron successfully executes, below is what the victim sees:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Image-24-1024x768.webp\" alt=\"\" class=\"wp-image-2491\"\/><\/figure>\n\n\n\n<p><br><strong>CONCLUSION<\/strong><br><br>When you think about, cyber criminals like those behind Cyron rely on their victim\u2019s infecting themselves. Time and time again, phishing campaigns are the favoured delivery method because people keep opening attachments from suspicious sources.\u00a0<br><br>As long as people keep shooting themselves in the foot like this, ransomware isn\u2019t going anywhere. Unfortunately, in many cases, the encryption algorithms used in these attacks are too advanced to be decrypted without paying the culprits. It\u2019s an old clich\u00e9, but prevention is better than cure. Don\u2019t open attachments or click on links from unknown senders and you\u2019ll have greatly reduced your exposure to ransomware.<br><br><br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yet another strain of Ransomware has been discovered plaguing victims, highlighting how popular this malware flavour has become with criminals. This time around, the strain has been dubbed &lsquo;Cyron&rsquo; as it encrypts all user files with a .cyron extension before turning off the system and finally making the desktop un-usable. Cyron is distributed primarily via [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2492,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2466"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2466\/revisions"}],"predecessor-version":[{"id":4260,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2466\/revisions\/4260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2492"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}