THREAT ANALYSIS: Beast Ransomware

Cybereason issues Threat Analysis reports to investigate emerging threats and provide practical recommendations for protecting against them. In this Threat Analysis report, Cybereason investigates the Ransomware-as-a-Service (RaaS) known as Beast and how to defend against it through the Cybereason Defense Platform.

KEY POINTS

  • Expanding Marketplace: The Beast Ransomware group provides various tools  with constant version updates. These updates are made to appeal to wider audiences across the underground cybercrime ecosystem. 
  • Binary Customizations: The Beast RaaS platform offers affiliates numerous options for building ransomware binaries that target Windows, Linux, and ESXi systems, enabling tailored configurations to suit different operational requirements.
  • Detection And Prevention: The Cybereason Defense Platform employs advanced Anti-Ransomware and Anti-Malware features, designed to detect and block ransomware payloads like Beast before they can execute.

INTRODUCTION

The Beast Ransomware group has been active since 2022. Recently, a Beast Ransomware partnership program and new capabilities were promoted on the underground forums in June. The group has updated and created various versions to meet the market demand. 

beast-ransomware-blog-1

Invitation to cooperate in Russian, English and Chinese languages.

Previous versions of the Beast Ransomware, also known as Monster, were developed using the Delphi programming language and offered as a Ransomware-as-a-Service (RaaS) platform.

beast-ransomware-blog-2

First Appearance Of Beast Ransomware On The Russian Anonymous Marketplace

TECHNICAL ANALYSIS

Beast Operating System Support – Windows 

The current known Windows versions of Beast demonstrate the following capabilities:

  • Combination of Elliptic-curve and ChaCha20 encryption model  
  • Written in the C programming language

beast-ransomware-blog-3

Beast Windows Binary

  • Segmented file encryption
  • ZIP wrapper mode - Files are converted on the fly to .zip with ransom note inside
  • Multithreaded queue for encryption
  • Processes/Services termination
  • Shadow copy delete
  • Mounting hidden partitions
  • Subnet scanner
  • In August 2024, offline builder was promoted with option to configure builds for Windows, NAS, ESXi.

beast-ransomware-blog-4

New Beast Offline Builder

Beast Operating System Support – Linux And ESXi

The Beast Linux version has the following capabilities (controllable via command line argument):

  • Selectable path for encryption
  • Enable/disable certain functionality
  • Ransom note generation from external file
  • Daemon mode
  • Written in C and Go programming languages

The VMWare ESXi version also has the following additional options:

  • Option to shut down a VM and machine’s files encryption
  • Option to exclude some vmid

 

beast-ransomware-blog-5

Linux & ESXi Version Parameters

Binary Analysis - BEAST HERE? 

Like most ransomware, the initial compromise often occurs through various infection vectors, such as phishing emails, or compromised remote desktop protocol (RDP) endpoints.

To prevent multiple instances of Beast running simultaneously on the same system, it creates a unique mutex with the string “BEAST HERE?”. This ensures efficient execution and enables the attacker to maintain control over the ransomware’s behavior on the infected system. 

beast-ransomware-blog-6

Beast Creates A Mutex Object With BEAST HERE? String

The latest version of Beast Ransomware specifically avoids encrypting data on devices located in Commonwealth of Independent States (CIS) countries, such as Russia, Belarus, and Moldova. This is achieved through code that checks the system's default language settings, country code, and retrieves the target's IP address. 

If the ransomware detects that the device is in a CIS country, it halts encryption activities. This strategic exclusion is likely a tactic to avoid drawing attention or repercussions from authorities in those regions.

beast-ransomware-blog-7

Checking Victim IP & Location By Connecting To iplogger.co

Beast performs SMB scans to automatically search for and infect vulnerable computers on nearby networks. This self-propagation mechanism can quickly spread the payload without requiring any human intervention.

beast-ransomware-blog-8

Beast SMB Scanning

Load Of RstrtMgr DLL (Restart Manager)

RstrtMgr.dll, the Restart Manager, is a critical system component that safeguards open and unsaved files during system reboots. It acts as a gatekeeper, prompting users to save their work before shutting down to prevent data loss. Beast Ransomware exploits this DLL in a malicious way. 

Before encrypting a file, the ransomware stops services and processes in order to unlock and safely close open files. 

beast-ransomware-blog-9

beast-ransomware-blog-10

The list of services targeted by Beast Ransomware is as following:

beast-ransomware-blog-11

beast-ransomware-blog-12

 

List of services targeted by Beast Ransomware

AcronisAgent

BackupExecDiveciMediaService

CAARCUpdateSvc

GxBlr

Intuit.QuickBooks.FCS

AcrSch2Svc

BackupExecJobEngine

CASAD2DWebSvc

GxClMgr

Memtas

Backup

BackupExecManagementService

ccEvtMgr

GxCVD

Mepocs

BackupExecAgentAccelerator

BackupExecRPCService

ccSetMgr

GxFWD

Msexchange

BackupExecAgentBrowser

BackupExecVSSProvider

DefWatch

GxVss

PDVFSService

VeeamDeploymentService

VeeamNFSSvc

VeeamTransportSvc

VSNAPVSS

Vss

YooBackup

YooIT

Zhudongfangyu

MSSQLFDLauncher

MSSQLSERVER

SQLTELEMETRY

MsDtsServer130

SSISTELEMETRY130

SQLWriter

MSSQL$VEEAMSQL2012

SQLAgent

MSSQLSERVERADHelper100

MSSQLServerOLAPService

MsDtsServer100

ReportServer

MSSQL$PROGID

MSSQL$WOLTERSKLUWER

SQLAgent$PROGID

SQLAgent$WOLTERSKLUWER

MSSQLFDLauncher$OPTIMA

ReportServer$OPTIMA

msftesql$SQLEXPRESS

Postgresql-x64-9.4

SavRoam

Wscsvc

SQLTELEMETRY$HL

MSSQL$OPTIMA

SQLSERVERAGENT

SQLAgent$VEEAMSQL2012

SQLAgent$OPTIMA

Veeam

Wuauserv

SQLBrowser

MSSQL

TMBMServer

 

Shadow Copy Delete

When Shadow Copy delete process is initiated by Beast Ransomware, it calls the IWbemServices::ExecQuery(“WQL”, ”Select * FROM Win32_ShadowCopy”)WQL query to get the IEnumWbemClassObject object for querying shadow copies and IWbemServices::DeleteInstance(“\\MachineName\ROOT\CIMV2:Win32_ShadowCopy.ID=”{Shadow Copy ID}””) to delete them.

beast-ransomware-blog-13

Beast Querying Shadow Copies

beast-ransomware-blog-14

Beast Deleting Shadow Copies

File Encryption

Ransomware often employs multithreading to accelerate file encryption.

This technique involves the parent thread identifying and sending files for encryption to child threads. 

The child threads then work concurrently, each encrypting a different file, significantly speeding up the overall encryption process. This approach leverages the system's hardware capabilities to encrypt files more efficiently.

beast-ransomware-blog-15

Beast Ransomware Threads (demonstrating multithreading usage)

Beast uses powerful encryption methods to lock down files on all connected devices in a network. It targets a variety of file formats, such as documents, pictures, videos, and databases. 

Once files are encrypted, victims can't access them unless they have the decryption key, which is controlled by the attackers.

beast-ransomware-blog-16

PDF File Encryption Process Example

beast-ransomware-blog-17

Encrypted Files

The ransom note thread extracts and decodes the embedded ransom note, which was specified in the malware's settings. This note is then saved as a "README.txt" file in every directory that isn't explicitly excluded from encryption.

beast-ransomware-blog-18

Creation Of The Ransom Note README.txt

beast-ransomware-blog-19

Ransom Note

In order to see Beast Ransomware GUI during the encryption process, it is needed to press and hold ALT+CTRL and type 666:

beast-ransomware-blog-20

Beast Ransomware GUI

Indicators of Compromise - IOCs

Cybereason shared a list of indicators of compromise related to this research :

IOC

IOC type

Description

iplogger[.]co/1v1i85[.]torrent

Domain Name

Geofencing IP query 

4c44ac1eea4bc7f4ea542d611b5658d7ac2729d79abe750da83f1581cd832eaf

SHA-256

Beast Windows Encryptor 

369034bf1d793fe56ea4d683a156722d825ad9829fc128117f82a26bc1d0480b

SHA-256

Beast Windows Encryptor 

e01f5c7067dc984dceb883b10444b1a5b0f22ebd500baf9d9a88207f5033285d

SHA-256

Beast Windows Encryptor 

dd09a2ef31d018fd83f186e3eaaccccdaa8a8c8779ced668abb06dc934d89a2d

SHA-256

Beast Windows Encryptor 

dbbe792e6c804518909f8990a836552573522d126547429d6cd3fcb1f60d542c

SHA-256

Beast Windows Encryptor 

 

Cybereason Recommendations:

  • Follow and hunt Beast affiliate activity in order to identify pre-ransomware behaviors. 
  • Promote cybersecurity best practices such as multifactor authentication and patch management.
  • For Cybereason customers on the Cybereason Defense Platform:
    • Enable Anti-Malware and set the Anti-Malware > Signatures mode to Prevent, Quarantine, or Disinfect.
    • Enable Anti-Ransomware (PRP), set Anti-Ransomware to Quarantine mode and enable shadow copy protection.
    • Enable Application Control.
    • Keep systems fully patched: Make sure your systems are patched in order to mitigate vulnerabilities.
    • Regularly backup files and create a backup process and policy : Restoring your files from a backup is the fastest way to regain access to your data.
    • Enable Variant Payload Prevention with prevent mode on Cybereason Behavioral execution prevention.

MITRE ATT&CK MAPPING

Tactic

Techniques / Sub-Techniques

TA0002: Execution

T1047 – Windows Management Instrumentation

TA0002: Execution

T1106 - Native API

TA0003: Persistence

T1543.003 – Create or Modify System Process: Windows Service

TA0007: Discovery 

T1083 - File and Directory Discovery

TA0004: Privilege Escalation

T1078.001 – Valid Accounts: Default Accounts

TA0004: Privilege Escalation

T1078.002 – Valid Accounts: Domain Accounts

TA0007: Discovery 

T1135 - Network Share Discovery

TA0007: Discovery 

T1016 - System Network Configuration Discovery

TA0005: Defense Evasion

T1406.002 – Obfuscated Files or Information: Software Packing

TA0005: Defense Evasion

T1620 - Reflective Code Loading

TA0008: Lateral Movement

T1021.002 - Remote Service: SMB/Windows Admin Shares

TA0009: Collection

T1119 – Automated Collection

TA0040: Impact

T1486 - Data Encrypted for Impact

TA0040: Impact

T1489 – Service Stop

TA0040: Impact

T1490 – Inhibit System Recovery

 

References

https://blogs.blackberry.com/en/2022/09/some-kind-of-monster-raas-hides-itself-using-traits-from-other-malware

https://cyberint.com/blog/research/the-nature-of-the-beast-ransomware/

 

ABOUT THE RESEARCHER

Mark Tsipershtein, Security Researcher at Cybereasonmark-tsipershtein-hs

Mark Tsipershtein, a security researcher at the Cybereason Security Research Team, focuses on research, analysis automation and infrastructure. Mark has more than 20 years of experience in SQA, automation, and security research.


Cybereason is dedicated to teaming with Defenders to end cyber attacks from endpoints to the enterprise to everywhere. Learn more about Cybereason XDR powered by Google Chronicle as well as Cybereason SDR, check out our Extended Detection and Response (XDR) Toolkit, or schedule a demo today to learn how your organization can benefit from an operation-centric approach to security.

Cybereason Security Services Team
About the Author

Cybereason Security Services Team

All Posts by Cybereason Security Services Team