{"id":2799,"date":"2024-09-25T20:04:58","date_gmt":"2024-09-25T20:04:58","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2799"},"modified":"2025-07-29T06:40:08","modified_gmt":"2025-07-29T06:40:08","slug":"spider-ransomware-dusts-itself-off-and-continues-crawling","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/spider-ransomware-dusts-itself-off-and-continues-crawling\/","title":{"rendered":"Spider ransomware dusts itself off and continues crawling"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"473\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13544178019085.webp\" alt=\"Spider ransomware dusts itself off and continues crawling\" class=\"wp-image-2829\"\/><\/figure>\n<\/div>\n\n\n<p>After gaining headlines in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/file-spider-ransomware-targeting-the-balkans-with-malspam\/\" target=\"_blank\" rel=\"noopener\">December last year<\/a>, File Spider ransomware has returned to ring in the New Year with updated file hashes. As per last year\u2019s campaign, Balkan countries are the primary target with people in Bosnia and Herzegovina, Serbia, and Croatia the main victims. &nbsp;<\/p>\n\n\n\n<p>Spam emails containing macro-enabled malicious Word documents are still the delivery method of choice, and upon successful infection File Spider gives victims 96 hours to pay the ransom before files are permanently deleted.<\/p>\n\n\n\n<p><strong>Overview<\/strong><\/p>\n\n\n\n<p>Victims are sent an email masquerading as a debt collection notice. An attached document contains malicious macros which, once enabled, starts downloading the ransomware executables from a remote site.<\/p>\n\n\n\n<p>The macro contains Base64 encoded PowerShell script that when executed will download XOR encrypted files called \u201cenc.exe\u201d and \u201cdec.exe\u201d.&nbsp;<\/p>\n\n\n\n<p>Dec.exe is the decryptor and GUI for the ransomware. It quietly runs in the background until enc.exe, which is the encryptor, scans the local drivers and encrypts any files which match targeted extensions with AES-128-bit encryption.<\/p>\n\n\n\n<p>The URLs used to download the files are the same as December\u2019s campaign:<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/yourjavascript[.]com\/5118631477\/javascript-dec-2-25-2.js<br><br>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/yourjavascript[.]com\/53103201277\/javascript-enc-1-0-9.js&nbsp;<\/p>\n\n\n\n<p>As mentioned earlier, the ransomware\u2019s file hashes have been updated for the New Year campaign. We believe the attackers have done so to evade detection as the December 2017 File Spider campaign gained significant <a href=\"http:\/\/www.zdnet.com\/article\/new-spider-ransomware-threatens-to-delete-all-your-files-if-you-dont-pay-within-96-hours\/\" target=\"_blank\" rel=\"noopener\">media <\/a><a href=\"https:\/\/www.scmagazine.com\/file-spider-ransomware-hitting-balkan-nations\/article\/718403\/\" target=\"_blank\" rel=\"noopener\">coverage<\/a>.<\/p>\n\n\n\n<p>New hashes:<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;dec.exe: fdd465863a4c44aa678554332d20aee3<br><br>\u2022&nbsp;&nbsp; &nbsp;enc.exe: 67d5abda3be629b820341d1baad668e3<\/p>\n\n\n\n<p>Old hashes:<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;dec.exe: 74e5096f09a031800216640a8455bc487e9a32b2e56fbad9d083c3810ed5488e<br><br>\u2022&nbsp;&nbsp; &nbsp;enc.exe: 6500a1baa13e0698e3ed41b4465e5824e9a316b22209223754f0ab04a6e1b853<\/p>\n\n\n\n<p>This ransomware also has some unique features. It encrypts files in the victim&#8217;s PC but does not harm it, which means multiple anti-virus software are unable to detect it. It also remains present in the target system even after removal.<\/p>\n\n\n\n<p><strong>File Details<\/strong><br><br>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File Type&nbsp;<\/strong><\/td><td>Macro document (.docm) file<\/td><\/tr><tr><td><strong>Md5 hash<\/strong>&nbsp;<\/td><td>de7b31517d5963aefe70860d83ce83b9<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><br><br>On analyzing the malicious document\u2019s macro code, it was found the document executes \u201cpowershell.exe\u201d and checks for the \u201cApplicationData\u201d folder as shown below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"493\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-3-2-1024x493.webp\" alt=\"\" class=\"wp-image-2806\"\/><\/figure>\n\n\n\n<p>It then attempts to use a web client to download a file from the following URL:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"192\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-3-3-1024x192.webp\" alt=\"\" class=\"wp-image-2807\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"278\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-2-3-1024x278.webp\" alt=\"\" class=\"wp-image-2808\"\/><\/figure>\n\n\n\n<p>File Spider then drops \u201cenc.exe\u201d and \u201cdec.exe\u201d from the URLs mentioned above:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"210\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-2-3-1024x210.webp\" alt=\"\" class=\"wp-image-2809\"\/><\/figure>\n\n\n\n<p>These two files perform successful ransomware activities on the victim\u2019s PC using the following codes:\u00a0 \u00a0 <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-2-3-1024x400.webp\" alt=\"\" class=\"wp-image-2810\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"899\" height=\"513\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-2-3.webp\" alt=\"\" class=\"wp-image-2811\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"490\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-2-3-1024x490.webp\" alt=\"\" class=\"wp-image-2812\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"420\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-2-1.webp\" alt=\"\" class=\"wp-image-2813\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"407\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-1-3-1024x407.webp\" alt=\"\" class=\"wp-image-2814\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"590\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-1-3.webp\" alt=\"\" class=\"wp-image-2815\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"570\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-1-3.webp\" alt=\"\" class=\"wp-image-2816\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"575\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-1-2.webp\" alt=\"\" class=\"wp-image-2817\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"388\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-1-1.webp\" alt=\"\" class=\"wp-image-2818\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1014\" height=\"415\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-12.webp\" alt=\"\" class=\"wp-image-2819\"\/><\/figure>\n\n\n\n<p>\u00a0<strong>Dynamic Analysis<\/strong><br><br>Our first step in dynamic analysis was to enable the macro content in a dedicated malware analysis environment:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"649\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-9-1024x649.webp\" alt=\"\" class=\"wp-image-2820\"\/><\/figure>\n\n\n\n<p><br><br>We then observed its activities:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"660\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16-8.webp\" alt=\"\" class=\"wp-image-2821\"\/><\/figure>\n\n\n\n<p>The sample initiates the \u201cpowershell.exe\u201d process which tries to establish a connection to the IP address \u201c80.241.212.33\u201d, as shown:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"701\" height=\"169\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-7.webp\" alt=\"\" class=\"wp-image-2822\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"437\" height=\"503\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-5.webp\" alt=\"\" class=\"wp-image-2823\"\/><\/figure>\n\n\n\n<p>The JavaScript file for dec.exe is then downloaded and executed:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"405\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-4-1024x405.webp\" alt=\"\" class=\"wp-image-2824\"\/><\/figure>\n\n\n\n<p>Once complete, enc.exe starts executing at the back-end and file encryption begins:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"125\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/21-3.webp\" alt=\"\" class=\"wp-image-2826\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"487\" height=\"280\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/22-2.webp\" alt=\"\" class=\"wp-image-2827\"\/><\/figure>\n\n\n\n<p>The end result of this process is that all user\u2019s file are encrypted with the .spider extension. Below is the ransom message the user sees on their machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"545\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/23-1-1024x545.webp\" alt=\"\" class=\"wp-image-2828\"\/><\/figure>\n\n\n\n<p>After successful infection and encryption, the following files are dropped on the victim\u2019s machine:<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\5p1d3r<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\dec.exe<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\files.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\id.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\run.bat<br><br>Below is the entry made in the windows registry during the infection process:<br><br>\u201cHKU\\S-1-5-21-1473857359-2239192248-2645835995-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\Starter: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Spider\\dec.exe startup&#8221;<br><br><strong>Indicators of Compromise<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Original malicious document<\/td><td>de7b31517d5963aefe70860d83ce83b9<\/td><\/tr><tr><td>dec.exe<\/td><td>fdd465863a4c44aa678554332d20aee3<\/td><\/tr><tr><td>enc.exe<\/td><td>67d5abda3be629b820341d1baad668e3<\/td><\/tr><tr><td>CnCs<\/td><td>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/spiderwjzbmsmu7y[.]onion<br>\u2022&nbsp;&nbsp; &nbsp;hxxps:\/\/vid[.]me\/embedded\/CGyDc?autoplay=1&amp;stats=1<br>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/yourjavascript[.]com\/5118631477\/javascript-dec-2-25-2.js<br>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/yourjavascript[.]com\/53103201277\/javascript-enc-1-0-9.js&nbsp;<br>\u2022&nbsp;&nbsp; &nbsp;80.241.212.33<br>\u2022&nbsp;&nbsp; &nbsp;80.241.212.33<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Mitigation<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;Enable mailing system restrictions by blacklisting files with the extensions .js, .vbs, .docm, .hta, .exe, .cmd, .scr, and .bat<br><br>\u2022&nbsp;&nbsp; &nbsp;Rename the process \u201cvssadmin.exe&#8221; so that the ransomware does not destroy volume shadow copies<br><br>\u2022&nbsp;&nbsp; &nbsp;Keep firewalls on and active<br><br>\u2022&nbsp;&nbsp; &nbsp;Perform regular file backups by creating and maintaining different restore points. This will allow you to revert back at any point of time<br><br>\u2022&nbsp;&nbsp; &nbsp;Do not open attachments from suspicious or unknown senders<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After gaining headlines in December last year, File Spider ransomware has returned to ring in the New Year with updated file hashes. As per last year&rsquo;s campaign, Balkan countries are the primary target with people in Bosnia and Herzegovina, Serbia, and Croatia the main victims. &nbsp; Spam emails containing macro-enabled malicious Word documents are still [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2829,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2799"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2799\/revisions"}],"predecessor-version":[{"id":4314,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2799\/revisions\/4314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2829"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}