Jaff Ransomware – Remove It and Restore .Jaff Files (Update June 2017)

Jaff Ransomware – Remove It and Restore .Jaff Files

The article will help you remove Jaff ransomware completely. Follow the Jaff ransomware removal instructions at the end of the article.

Jaff is the name of a ransomware cryptovirus. The extension .Jaff will get appended to every encrypted file. The cryptovirus mimics Locky ransomware in more than one way, including the payment page design, the way it distributes its infection payload and more. Keep reading and see how you could try to potentially recover some of your files.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware copies the distribution and infection methods of Locky as well as its ransom payment page design.
SymptomsThe ransomware will encrypt your files and put the extension .Jaff on your files after it completes its encryption process.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Jaff


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Jaff.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Jaff Ransomware – Update

Update July 2017! A decryption tool is now available for the Jaff Ransomware! The tool is developed by Kaspersky and called RakhniDecryptor. It can be downloaded from the following link, wrapped inside a .zip archive: RakhniDecryptor.

Jaff Ransomware – Update June 2017

Our research indicates that the ransomware is still making rounds in the wild, infecting users and encrypting their data. The ransomware is still being distributed via malicious spam from the Necurs botnet. The spam campaign delivers PDF attachments with embedded Word documents containing malicious macros. For the infection to take place, users should open the PDF attachment, agree to open the embedded Word document, and then they should enable macros on the document.

According to Malware Traffic Analysis, these are the archives currently spreading Jaff ransomware:

  • Zip archive of the pcap: 2017-06-01-Jaff-ransomware-malspam-traffic.pcap.zip 213 kB (213,387 bytes)
  • Zip archive of the spreadsheet tracker: 2017-06-01-Jaff-ransomware-malspam-tracker.csv.zip 0.8 kB (837 bytes)
  • Zip archive of the emails, malware, and artifacts: 2017-06-01-Jaff-ransomware-emails-and-artifacts.zip 821 kB (820,839 bytes)

Jaff Ransomware – Infection

Jaff ransomware uses the latest distribution method used by Locky ransomware. That method uses a Microsoft .doc file embedded within a PDF, which is attached to a spam e-mail. If you open such a PDF, the following message will pop up:

And afterward the following window will display:

If you click on Enable Editing and right after that on Enable Content, your PC will get infected after the launch of a few commands and interaction between a C2 server (Command and Control).

Jaff ransomware might also be spreading its payload file via social media and file-sharing networks. Freeware that is spread on the Web can be presented as helpful but could also hide the malicious script for this cryptovirus. Refrain from opening files after you have downloaded them, especially if they come from places like suspicious emails and links with unknown origins. Links that are known to deliver the Jaff ransomware that you should avoid at any cost:

  • http://takanashi[.]jp/f87346b
  • http://babil117[.]com/f87346b
  • http://easysupport[.]us/f87346b
  • http://julian-g[.]ro/f87346b
  • http://phinamco[.]com/f87346b
  • http://techno-kar[.]ru/f87346b
  • http://tiskr[.]com/f87346b
  • http://trans-atm[.]com/f87346b
  • http://trialinsider[.]com/f87346b
  • http://wipersdirect[.]com/f87346b

Instead of opening, you should scan the files with a security tool and check them for anything that seems out of place.

Jaff Ransomware – In Detail

Jaff ransomware is the name given to a virus with an encryption function. Interestingly enough, the ransomware copies the ransom payment page design of Locky virus with only changing the name and the demanded ransom sum. The extension .Jaff will get appended to all files that become locked after the encryption process is set and done.

Jaff ransomware makes entries in the Windows Registry to achieve a form of persistence, and even launch and repress processes inside the Windows Operating System. Some of these entries are designed in a way that will start the virus automatically with every launch of Windows. One registry entry reported to be implemented by this ransomware is the following:

→HKCU\Control Panel\Desktop\Wallpaper “C:\ProgramData\Rondo\WallpapeR.bmp”

The ransom note will be displayed after the encryption process is complete. It will be put in three identical files which are ReadMe.bmp, ReadMe.html and ReadMe.txt. Inside them there will be instructions. Here is how the note looks like as a .bmp image:

The text inside those two files is the following:

jaff decryptor system
Files are encrypted!
To decrypt flies you need to obtain the private key.
The only copy of the private key, which will allow you to decrypt your files, is
located on a secret server in the Internet
You must install Tor Browser:
After instalation, run the Tor Browser and enter address:
Follow the instruction on the web-site.
Your decrypt ID: 1019218184

From there you are pointed to the actual payment page located on the TOR network:

The TOR page used for the payment states:

jaff decryptor system™

We present a special software – jaff decryptor™ – Recovery all files

How to buy jaff decryptor™?

You can make a payment with BitCoins, there are many methods to get them.

You should register BitCoin wallet:

Simplest online wallet or Some other methods of creating wallet

Purchasing Bitcoins, although it’s not yet easy to buy bitcoins, it’s getting simpler every day.

Here are our recommendations:

localbitcoins.com (WU) Buy Bitcoins with Western Union.
coincafe.com Recommended for fast, simple service.
Payment Methods: Western Union, Bank of America, Cash by FedEx, Moneygram, Money Order. In NYC: Bitcoin ATM, in person.
localbitcoins.com Service allows you to search for people in your community willing to sell bitcoins to you directly.
cex.io Buy Bitcoins with VISA/MASTERCARD or wire transfer.
btcdirect.eu The best for Europe.
bitquick.co Buy Bitcoins instantly for cash.
howtobuybitcoins.info An international directory of bitcoin exchanges.
cashintocoins.com Bitcoin for cash.
coinjar.com CoinJar allows direct bitcoin purchases on their site.

Send 1.82196031 BTC to Bitcoin address:

Note: Payment pending up to 30 mins or more for transaction confirmation, please be patient…

Date Amount BTC BTC address Confirmations
11.05.17, 09:20 1.82196031 15aCs4rGrfEs597hbo3PW93DVhTLTsxcii 0

Refresh the page and download jaff decryptor

When Bitcoin transactions will receive one confirmation, you will be redirected to the page for downloading the jaff decryptor

The above TOR payment page of the Jaff ransomware demands you to pay 1.82 Bitcoin, which equals to 3.372 US dollars at the moment of writing this article. Newer versions even ask more than 2 Bitcoin as a ransom price. However, you should NOT under any circumstances pay anything to the cybercriminals. Nobody can guarantee that you will get your files restored upon payment, nor that you won’t get your PC infected again in the future. Furthermore, giving money to criminals will likely motivate them to do more crime, like the creation of more ransomware.

Jaff Ransomware – Encryption

Jaff ransomware seeks to encrypt files that have the following 423 extensions:

→.xlsx , .acd , .pdf , .pfx , .crt , .der , .cad , .dwg , .MPEG , .rar , .veg , .zip , .txt , .jpg , .doc , .wbk , .mdb , .vcf , .docx , .ics , .vsc , .mdf , .dsr , .mdi , .msg , .xls , .ppt , .pps , .obd , .mpd , .dot , .xlt , .pot , .obt , .htm , .html , .mix , .pub , .vsd , .png , .ico , .rtf , .odt , .3dm , .3ds , .dxf , .max , .obj , .7z , .cbr , .deb , .gz , .rpm , .sitx , .tar , .tar, .gz , .zipx , .aif , .iff , .m3u , .m4a , .mid , .key , .vib , .stl , .psd , .ova , .xmod , .wda , .prn , .zpf , .swm , .xml , .xlsm , .par , .tib , .waw , .001 , .002 003, . , .004 , .005 , .006 , .007 , .008 , .009 , .010 , .contact , .dbx , .jnt , .mapimail , .oab , .ods , .ppsm , .pptm , .prf , .pst , .wab , .1cd , .3g2 , .7ZIP , .accdb , .aoi , .asf , .asp, . aspx , .asx , .avi , .bak , .cer , .cfg , .class , .config , .css , .csv , .db , .dds , .fif , .flv , .idx , .js , .kwm , .laccdb , .idf , .lit , .mbx , .md , .mlb , .mov , .mp3 , .mp4 , .mpg , .pages , .php , .pwm , .rm , .safe , .sav , .save , .sql , .srt , .swf , .thm , .vob , .wav , .wma , .wmv , .xlsb , .aac , .ai , .arw , .c , .cdr , .cls , .cpi , .cpp , .cs , .db3 , .docm , .dotm , .dotx , .drw , .dxb , .eps , .fla , .flac , .fxg , .java , .m , .m4v , .pcd , .pct , .pl , .potm , .potx , .ppam , .ppsx , .ps , .pspimage , .r3d , .rw2 , .sldm , .sldx , .svg , .tga , .wps , .xla , .xlam , .xlm , .xltm , .xltx , .xlw , .act , .adp , .al , .bkp , .blend , .cdf , .cdx , .cgm , .cr2 , .dac , .dbf , .dcr , .ddd , .design , .dtd , .fdb , .fff , .fpx , .h , .iif , .indd , .jpeg , .mos , .nd , .nsd , .nsf , .nsg , .nsh , .odc , .odp , .oil , .pas , .pat , .pef , .ptx , .qbb , .qbm , .sas7bdat , .say , .st4 , .st6 , .stc , .sxc , .sxw , .tlg , .wad , .xlk , .aiff , .bin , .bmp , .cmt , .dat , .dit , .edb , .flvv , .gif , .groups , .hdd , .hpp , .log , .m2ts , .m4p , .mkv , .ndf , .nvram , .ogg , .ost , .pab , .pdb , .pif , .qed , .qcow , .qcow2 , .rvt , .st7 , .stm , .vbox , .vdi , .vhd , .vhdx , .vmdk , .vmsd , .vmx , .vmxf , .3fr , .3pr , .ab4 , .accde , .accdt , .ach , .acr , .adb , .srw , .st5 , .st8 , .std , .sti , .stw , .stx , .sxd , .sxg , .sxi , .sxm , .tex , .wallet , .wb2 , .wpd , .x11 , .x3f , .xis , .ycbcra , .qbw , .qbx , .qby , .raf , .rat , .raw , .rdb rwl , .rwz , .s3db , .sd0 , .sda , .sdf , .sqlite , .sqlite3 , .sqlitedb , .sr , .srf , .oth , .otp , .ots , .ott , .p12 , .p7b , .p7c , .pdd , .pem , .plus_muhd , .plc , .pptx , .psafe3 , .py , .qba , .qbr, .myd , .ndd , .nef , .nk , .nop , .nrw , .ns2 , .ns3 , .ns4 , .nwb , .nx2 , .nxl , .nyf , .odb , .odf , .odg , .odm , .ord , .otg , .ibz , .iiq , .incpas , .jpe , .kc2 , .kdbx , .kdc , .kpdx , .lua , .mdc , .mef , .mfw , .mmw , .mny , .moneywell , .mrw, .des , .dgc , .djvu , .dng , .drf , .dxg , .eml , .erbsql , .erd , .exf , .ffd , .fh , .fhd , .gray , .grey , .gry , .hbk , .ibank , .ibd , .cdr4 , .cdr5 , .cdr6 , .cdrw , .ce1 , .ce2 , .cib , .craw , .crw , .csh , .csl , .db_journal , .dc2 , .dcs , .ddoc , .ddrw , .ads , .agdl , .ait , .apj , .asm , .awg , .back , .backup , .backupdb , .bank , .bay , .bdb , .bgt , .bik , .bpw , .cdr3 , .as4

Extensions List Source: ForcePoint.com

Each one of the files that gets encrypted will receive the .Jaff extension appended to them as a secondary one. For example the Work.doc file will become Work.doc.jaff and the file will be inaccessible.

The encryption algorithms which are utilized by the ransomware are believed to be AES and RSA. Besides, the implemented encryption system CryptoAPI which is implemented into the Windows OS is also used for the complex encryption process.

The Jaff cryptovirus could be set to erase the Shadow Volume Copies from the Windows operating system by using the following command:

→vssadmin.exe delete shadows /all /Quiet

If the command above is executed, it will make decryption efforts harder, if you try to use a recovery method that involves the Shadow Volume Copies. Keep on reading and check out what ways you can try to potentially restore some of your files.

Remove Jaff Ransomware and Restore .Jaff Files

If your computer got infected with the Jaff ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete Jaff from your computer

Note! Substantial notification about the Jaff threat: Manual removal of Jaff requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Jaff files and objects
2. Find malicious files created by Jaff on your PC

Automatically remove Jaff by downloading an advanced anti-malware program

1. Remove Jaff with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Jaff
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share