Interlock Ransomware’s Targeted Attacks on Companies

Interlock Ransomware’s Targeted Attacks on Companies

Summary

About Interlock

–      Appeared at the end of September 2024

–      Ransomware attacks targeting companies in various countries and industries worldwide

–      Recently, there have also been ransomware attacks in various industries such as healthcare, education, and public institutions (e.g., DaVita, Andretti Indoor Karting & Games)

–      Uses unclear statistics on DLS to pressure victims

About the Ransomware

–      Does not have the basic features of ransomware, such as deleting volume shadow copies, stopping database-related services, deleting event logs, or changing the desktop background

–      Checks parameter values before operation and has various features

–      Encryption using the OpenSSL library and AES, RSA algorithms

–      Each encrypted file has a different AES key

–      Information related to the AES key is encrypted with the RSA public key and inserted at the end of the file

–      Encrypted files cannot be decrypted using only the traces left on the local system

Overview

Interlock Profiles

The Interlock ransomware group first appeared at the end of September 2024 and has been continuously attacking various companies and critical infrastructure organizations in North America and Europe. Like other ransomware gangs, they encrypt files on infected systems, exfiltrate sensitive data from companies, and release it if the ransom is not paid.


Figure 1. Interlock ransomware group’s Dedicated Leak Site (DLS) called .onion

 

The Interlock ransomware group calls itself a “a relentless collective that exposes the recklessness of companies” and uses unclear statistics to pressure victims.

 

This information was also published on the DLS. It claims that 94% of attacks could have been prevented with patch management, the average downtime was 9.7 days, and the average cost of business interruption was $4.45 million. The Interlock ransomware group mainly targets companies that have failed to protect customer data and intellectual property.

 

The Interlock group is conducting double extortion attacks targeting healthcare, education, and public institutions, and they have attacked the US kidney dialysis company DaVita and the indoor entertainment operating company Andretti Indoor Karting & Games, among others. According to the FBI and CISA, the Interlock ransomware group has been continuously attacking various companies and critical infrastructure organizations in North America and Europe.


Figure 2. Interlock ransomware group’s introduction


Figure 3. Data from affected companies disclosed on the DLS (.onion)

The ransomware distributed by the Interlock ransomware group does not perform any additional network communication after encrypting files.

 

The AES-256-GCM (Galois/Counter Mode) algorithm is used for file encryption. The key and the initialization value (IV) are encrypted using the RSA-4096 public key and then inserted at the end of the file. The RSA public key is already included in the file, so if the threat actor can identify the file, it can be decrypted with the private key.

 

In particular, this encryption process is implemented using the OpenSSL library. It uses high-performance encryption and key management features to effectively combine the AES and RSA algorithms for file encryption. The ransom note provides the URL for the Tor site and encourages the victim to negotiate there.


Figure 4. Negotiation page found on the DLS

Analysis Details

Initial Routine

Interlock ransomware initially encrypts or obfuscates its main code to keep it hidden and only patches and loads the code into memory at runtime. Because the original ransomware code is only present in memory during execution, it can evade detection while operating normally. In other words, the initial code patching is believed to be a defensive technique used by the ransomware to hide its core logic, delay analysis, and evade security measures.

 

After the code patch is completed, the main code first checks for argument values, and if none are provided, it tries to encrypt all drives and attempts to enable access to symbolic links. Enabling symbolic links allows the ransomware to access and encrypt files that are connected through lnk files or symbolic links.

Argument Value

Behavior

-d <folder path> Attempts to encrypt by specifying a folder
-f <file name> Attempts to encrypt only one file
-t Argument value of test
-e Treats multiple argument values as a single set
-s Creates and runs a Task Scheduler task (privilege escalation)
-r Attempts forced encryption
-del Deletes itself

Table 1. Behavior by argument value

 

As can be seen in Table 1, this Interlock ransomware allows the use of multiple argument values with the -e argument value (e.g., -e -r -del). In the case of the -t argument value, it does not actually attempt encryption but creates a __test__ folder in the path where the ransomware is located and generates temporary files inside that folder. This argument value is used for testing purposes.

The -s argument value registers Interlock ransomware in the Task Scheduler and runs it to escalate to system privileges. After execution, the task is deleted.


Figure 6. Registering to the Task Scheduler and running

 

The -del argument value performs self-deletion after all behaviors of Interlock ransomware are complete. It creates a tmp<random number>.wasd file in the %TEMP% path and runs it using rundll32.exe.


Figure 7. Self-delete routine


Figure 8. Self-delete function of tmp<random number>.wasd

 

Preparing for Encryption

Certain folders, extensions, and files are excluded from encryption to prevent the system from being damaged by accidentally encrypting important files.

 

For extensions and files excluded from encryption, Interlock ransomware specifies extensions it uses for encrypted files, such as “!NT3RLOCK” and “OPEN_BEFORE_ANYTHING.txt”, as excluded from encryption. This prevents already encrypted files from being re-encrypted. The ransom note filename is also excluded so that victims can check the ransom note and proceed with negotiations.

Folders Excluded from Encryption

$Recycle.Bin / $RECYCLE.BIN
Boot
Documents and Settings
PerfLogs
ProgramData
Recovery
System Volume Information
Windows
$RECYCLE.BIN
AppData
WindowsApps
Windows Defender
WindowsPowerShell
Windows Defender Advanced Threat Protection

 

Table 2. Folders excluded from encryption

File Extensions Excluded from Encryption

bat, bin, cab, cmd, com, cur, diagcab, diagcfg, diagpkg, drv, hlp, hta, msi, ocx, psm1, scr, sys, ini, url, dll, exe, ps1, !NT3RLOCK

[Table 3] File Extensions Excluded from Encryption

Files Excluded from Encryption

Thumbs.db, OPEN_BEFORE_ANYTHING.txt

[Table 4] Files Excluded from Encryption

Before creating file encryption threads, the ransomware uses the GetSystemInfo() API to set the number of threads for encryption based on the number of CPU logical cores. The encryption process uses threads to create file search threads and file encryption threads, and works with multi-threading. As shown in Table 5, twice as many file encryption threads are created as file search threads.


Figure 9. Calculating the number of CPU logical cores

 


 Figure 10. Creating threads

 

No. of CPU Logical Cores

No. of File Search Threads

No. of File Encryption Threads

2 cores 2 4
4 cores 4 8
6 cores 6 12
8 cores 8 16
12 cores 12 24
16 cores 16 32

Table 5. Number of threads by CPU logical core count
 

MD5

3104efb23ea174ac5eda9f5fd0e8c077
33d8eabbf428fef8c5cd50b440ee3d07
6c3b2558fc8cfcb2751437b6e5cdeb6f
9451420233168c7b0c595257d43c7b85
c6d1d360b62c59624549d6a59c5acb59