.happyness Files Virus – How to Remove and Restore Your Data
THREAT REMOVAL

.happyness Files Virus – How to Remove and Restore Your Data

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by .happyness Files Virus and other threats.
Threats such as .happyness Files Virus may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article aims to help you by explaining what is .happyness files virus and how to remove Happyness ransomware completely from your computer system.

A new ransomware infection has been detected out in the wild, going by the wrongly-spelled extension name .happyness. The ransomware infection aims to infect the computers of victims and encrypt the files on them with the help of a combination of AES and RSA encryption algorithms. After doing so, the ransomware virus drops a ransom note file on the infected computers’ desktop, called
HOW_TO_RECOVER_ENCRYPTED_FILES.txt which provides instructions on how to pay a hefty ransom fee in Bitcoin in order to restore files that have been encrypted by this ransomware virus. In the event that your computer has been infected by the .happyness files virus, we advise that you read the following article in order to learn how to remove it from your computer and how to restore files, encrypted with it’s extension added.

Threat Summary

Name.happyness Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the compromised computer system in order to hold them hostage until the victim pays a hefty ransom fee.
SymptomsFiles are encrypted with the file extension .happyness added to them and the ransom note
HOW_TO_RECOVER_ENCRYPTED_FILES.txt is dropped on the victim’s PC.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .happyness Files Virus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .happyness Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.happyness Files Virus – How Does It Infect

The primary method of infection which is used by this ransomware is via spammed e-mail messages which propagate through various different types of methods, including the usage of web links which are masked as fake buttons, like the example fake PayPal image below displays:

When the user is tricked and clicks on the button, a malicious script is activated which may automatically download and run a malicious file on the victim’s computer that triggers the infection. The same method goes if a malicious file has been uploaded as an e-mail attachment, since most malicious files contain JavaScript.

In addition to this, the .happyness ransomware may also be uploaded as a malicious file online, pretending to be a legitimate:

  • Setup of a program or game.
  • Setup of a system driver.
  • Key generator, patch or software license activator.

.happyness Ransomware – How Does It Work

Happyness ransomware is the type of malware which aims to perform various different types of activities such as download it’s payload after infection, which consists of the malicious executable file plus the ransomware’s ransom note. The malicious file of the .happyness files virus has been reported to be dropped in one of the system folders of Windows:

  • %AppData%
  • %Windows%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%

After the malicious files of the ransomware infection have been dropped on the victim’s computer, the malware may also drop it’s ransom note file and set it so that the victim can see it, for example, create copies on the desktop of the infected computer. The ransom note, is called HOW_TO_RECOVER_ENCRYPTED_FILES.txt and has the following message, as reported by researcher Michael Gillespie(https://pastebin.com/ZRpvRjsg):

YOUR FILES ARE ENCRYPTED!

Your personal ID
{

All your files have been encrypted due to a security problem with your PC.
To restore all your files, you need a decryption.
If you want to restore them, write us to the e-mail
[email protected]

In a letter to send Your personal ID (see In the beginning of this document).
You have to pay for decryption in Bitcoins.
The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
In the letter, you will receive instructions to decrypt your files!

In a response letter you will receive the address of Bitcoin-wallet, which is necessary to perform the transfer of funds.
HURRY! Your personal code for decryption stored with us only 72 HOURS!

Our tech support is available 24 \ 7
Do not delete: Your personal ID
Write on e-mail, we will help you!

Free decryption as guarantee
Before paying you can send to us up to 1 files for free decryption.
Please note that files must NOT contain valuable information and their total size must be less than 5Mb.
When the transfer is confirmed, you will receive interpreter files to your computer.
After start-interpreter program, all your files will be restored.

Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders are not compatible with other users of your data, because each user’s unique encryption key

The .happyness files virus has been reported to be a variant of the Matroska ransomware family, which released a variant back in July 2017 and just like it, the ransomware may execute the following commands in Windows Command Prompt:

→ process call create “cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures”

After this has been done the .happyness ransowmare may also perform various other activities, such as set automatic running of it’s malicious file on Windows boot by modifying the following Windows Registry sub-keys:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

.happyness Ransomware – Encryption Process

In order to encrypt the files on the computers of victims, the .happyness files virus may use a combination of two main encryption algorithms – AES and RSA encryption. The AES cipher may be used in a variety of different methods, but researchers have reported the first 65 bytes of the files to be used and the first 300 bytes of the files are also encrypted via the RSA-4096 cipher, after which a unique decryption AES key is generated in the process of encrypting the resto of the targeted files. At the moment there is no direct decryption for this combination and this virus, and this is why most ransomware viruses use it. Furthermore, the .happyness ransomware also makes it so that only important files from the infected computers are encrypted, such as:

  • Documents.
  • Videos.
  • Images.
  • Audio files.
  • Other types of files.

After the encryption process has been done, the malware aims to set the .happyness file extension to the encrypted files, making them appear like the following:

Remove .happyness Ransomware and Restore Encrypted Files

In order to fully erase all traces of this ransomware infection, we advise you to follow the removal instructions down below. They are divided in manual and automatic removal instructions, so that they are appropriate based on your malware removal experience. In case you lack the experience in malware removal, experts recommend to download an advanced anti-malware software. It will make sure to scan automatically for all the malicious files and objects on your computer and secure your computer against future infections as well.

In order to try and restore files, encrypted by this ransomware virus, recommendations are to follow the alternative methods for file recovery down below in step “2. Restore files encrypted by .happyness Files Virus”. They are in no way fully effective against ransomware threats, but may help you to restore as many encrypted files as possible.

Note! Your computer system may be affected by .happyness Files Virus and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as .happyness Files Virus.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove .happyness Files Virus follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove .happyness Files Virus files and objects
2. Find files created by .happyness Files Virus on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by .happyness Files Virus

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...