Jaff Ransomware – Remove It and Restore .Jaff Files (Update June 2017)

Jaff Ransomware – Remove It and Restore .Jaff Files


with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Jaff and other threats.
Threats such as Jaff may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

The article will help you remove Jaff ransomware completely. Follow the Jaff ransomware removal instructions at the end of the article.

Jaff is the name of a ransomware cryptovirus. The extension .Jaff will get appended to every encrypted file. The cryptovirus mimics Locky ransomware in more than one way, including the payment page design, the way it distributes its infection payload and more. Keep reading and see how you could try to potentially recover some of your files.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware copies the distribution and infection methods of Locky as well as its ransom payment page design.
SymptomsThe ransomware will encrypt your files and put the extension .Jaff on your files after it completes its encryption process.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Jaff


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Jaff.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Jaff Ransomware – Update

Update July 2017! A decryption tool is now available for the Jaff Ransomware! The tool is developed by Kaspersky and called RakhniDecryptor. It can be downloaded from the following link, wrapped inside a .zip archive: RakhniDecryptor.

Jaff Ransomware – Update June 2017

Our research indicates that the ransomware is still making rounds in the wild, infecting users and encrypting their data. The ransomware is still being distributed via malicious spam from the Necurs botnet. The spam campaign delivers PDF attachments with embedded Word documents containing malicious macros. For the infection to take place, users should open the PDF attachment, agree to open the embedded Word document, and then they should enable macros on the document.

According to Malware Traffic Analysis, these are the archives currently spreading Jaff ransomware:

  • Zip archive of the pcap: 2017-06-01-Jaff-ransomware-malspam-traffic.pcap.zip 213 kB (213,387 bytes)
  • Zip archive of the spreadsheet tracker: 2017-06-01-Jaff-ransomware-malspam-tracker.csv.zip 0.8 kB (837 bytes)
  • Zip archive of the emails, malware, and artifacts: 2017-06-01-Jaff-ransomware-emails-and-artifacts.zip 821 kB (820,839 bytes)

Jaff Ransomware – Infection

Jaff ransomware uses the latest distribution method used by Locky ransomware. That method uses a Microsoft .doc file embedded within a PDF, which is attached to a spam e-mail. If you open such a PDF, the following message will pop up:

And afterward the following window will display:

If you click on Enable Editing and right after that on Enable Content, your PC will get infected after the launch of a few commands and interaction between a C2 server (Command and Control).

Jaff ransomware might also be spreading its payload file via social media and file-sharing networks. Freeware that is spread on the Web can be presented as helpful but could also hide the malicious script for this cryptovirus. Refrain from opening files after you have downloaded them, especially if they come from places like suspicious emails and links with unknown origins. Links that are known to deliver the Jaff ransomware that you should avoid at any cost:

  • http://takanashi[.]jp/f87346b
  • http://babil117[.]com/f87346b
  • http://easysupport[.]us/f87346b
  • http://julian-g[.]ro/f87346b
  • http://phinamco[.]com/f87346b
  • http://techno-kar[.]ru/f87346b
  • http://tiskr[.]com/f87346b
  • http://trans-atm[.]com/f87346b
  • http://trialinsider[.]com/f87346b
  • http://wipersdirect[.]com/f87346b

Instead of opening, you should scan the files with a security tool and check them for anything that seems out of place.

Jaff Ransomware – In Detail

Jaff ransomware is the name given to a virus with an encryption function. Interestingly enough, the ransomware copies the ransom payment page design of Locky virus with only changing the name and the demanded ransom sum. The extension .Jaff will get appended to all files that become locked after the encryption process is set and done.

Jaff ransomware makes entries in the Windows Registry to achieve a form of persistence, and even launch and repress processes inside the Windows Operating System. Some of these entries are designed in a way that will start the virus automatically with every launch of Windows. One registry entry reported to be implemented by this ransomware is the following:

→HKCU\Control Panel\Desktop\Wallpaper “C:\ProgramData\Rondo\WallpapeR.bmp”

The ransom note will be displayed after the encryption process is complete. It will be put in three identical files which are ReadMe.bmp, ReadMe.html and ReadMe.txt. Inside them there will be instructions. Here is how the note looks like as a .bmp image:

The text inside those two files is the following:

jaff decryptor system
Files are encrypted!
To decrypt flies you need to obtain the private key.
The only copy of the private key, which will allow you to decrypt your files, is
located on a secret server in the Internet
You must install Tor Browser:
After instalation, run the Tor Browser and enter address:
Follow the instruction on the web-site.
Your decrypt ID: 1019218184

From there you are pointed to the actual payment page located on the TOR network:

The TOR page used for the payment states:

jaff decryptor system™

We present a special software – jaff decryptor™ – Recovery all files

How to buy jaff decryptor™?

You can make a payment with BitCoins, there are many methods to get them.

You should register BitCoin wallet:

Simplest online wallet or Some other methods of creating wallet

Purchasing Bitcoins, although it’s not yet easy to buy bitcoins, it’s getting simpler every day.

Here are our recommendations:

localbitcoins.com (WU) Buy Bitcoins with Western Union.
coincafe.com Recommended for fast, simple service.
Payment Methods: Western Union, Bank of America, Cash by FedEx, Moneygram, Money Order. In NYC: Bitcoin ATM, in person.
localbitcoins.com Service allows you to search for people in your community willing to sell bitcoins to you directly.
cex.io Buy Bitcoins with VISA/MASTERCARD or wire transfer.
btcdirect.eu The best for Europe.
bitquick.co Buy Bitcoins instantly for cash.
howtobuybitcoins.info An international directory of bitcoin exchanges.
cashintocoins.com Bitcoin for cash.
coinjar.com CoinJar allows direct bitcoin purchases on their site.

Send 1.82196031 BTC to Bitcoin address:

Note: Payment pending up to 30 mins or more for transaction confirmation, please be patient…

Date Amount BTC BTC address Confirmations
11.05.17, 09:20 1.82196031 15aCs4rGrfEs597hbo3PW93DVhTLTsxcii 0

Refresh the page and download jaff decryptor

When Bitcoin transactions will receive one confirmation, you will be redirected to the page for downloading the jaff decryptor

The above TOR payment page of the Jaff ransomware demands you to pay 1.82 Bitcoin, which equals to 3.372 US dollars at the moment of writing this article. Newer versions even ask more than 2 Bitcoin as a ransom price. However, you should NOT under any circumstances pay anything to the cybercriminals. Nobody can guarantee that you will get your files restored upon payment, nor that you won’t get your PC infected again in the future. Furthermore, giving money to criminals will likely motivate them to do more crime, like the creation of more ransomware.

Jaff Ransomware – Encryption

Jaff ransomware seeks to encrypt files that have the following 423 extensions:

→.xlsx , .acd , .pdf , .pfx , .crt , .der , .cad , .dwg , .MPEG , .rar , .veg , .zip , .txt , .jpg , .doc , .wbk , .mdb , .vcf , .docx , .ics , .vsc , .mdf , .dsr , .mdi , .msg , .xls , .ppt , .pps , .obd , .mpd , .dot , .xlt , .pot , .obt , .htm , .html , .mix , .pub , .vsd , .png , .ico , .rtf , .odt , .3dm , .3ds , .dxf , .max , .obj , .7z , .cbr , .deb , .gz , .rpm , .sitx , .tar , .tar, .gz , .zipx , .aif , .iff , .m3u , .m4a , .mid , .key , .vib , .stl , .psd , .ova , .xmod , .wda , .prn , .zpf , .swm , .xml , .xlsm , .par , .tib , .waw , .001 , .002 003, . , .004 , .005 , .006 , .007 , .008 , .009 , .010 , .contact , .dbx , .jnt , .mapimail , .oab , .ods , .ppsm , .pptm , .prf , .pst , .wab , .1cd , .3g2 , .7ZIP , .accdb , .aoi , .asf , .asp, . aspx , .asx , .avi , .bak , .cer , .cfg , .class , .config , .css , .csv , .db , .dds , .fif , .flv , .idx , .js , .kwm , .laccdb , .idf , .lit , .mbx , .md , .mlb , .mov , .mp3 , .mp4 , .mpg , .pages , .php , .pwm , .rm , .safe , .sav , .save , .sql , .srt , .swf , .thm , .vob , .wav , .wma , .wmv , .xlsb , .aac , .ai , .arw , .c , .cdr , .cls , .cpi , .cpp , .cs , .db3 , .docm , .dotm , .dotx , .drw , .dxb , .eps , .fla , .flac , .fxg , .java , .m , .m4v , .pcd , .pct , .pl , .potm , .potx , .ppam , .ppsx , .ps , .pspimage , .r3d , .rw2 , .sldm , .sldx , .svg , .tga , .wps , .xla , .xlam , .xlm , .xltm , .xltx , .xlw , .act , .adp , .al , .bkp , .blend , .cdf , .cdx , .cgm , .cr2 , .dac , .dbf , .dcr , .ddd , .design , .dtd , .fdb , .fff , .fpx , .h , .iif , .indd , .jpeg , .mos , .nd , .nsd , .nsf , .nsg , .nsh , .odc , .odp , .oil , .pas , .pat , .pef , .ptx , .qbb , .qbm , .sas7bdat , .say , .st4 , .st6 , .stc , .sxc , .sxw , .tlg , .wad , .xlk , .aiff , .bin , .bmp , .cmt , .dat , .dit , .edb , .flvv , .gif , .groups , .hdd , .hpp , .log , .m2ts , .m4p , .mkv , .ndf , .nvram , .ogg , .ost , .pab , .pdb , .pif , .qed , .qcow , .qcow2 , .rvt , .st7 , .stm , .vbox , .vdi , .vhd , .vhdx , .vmdk , .vmsd , .vmx , .vmxf , .3fr , .3pr , .ab4 , .accde , .accdt , .ach , .acr , .adb , .srw , .st5 , .st8 , .std , .sti , .stw , .stx , .sxd , .sxg , .sxi , .sxm , .tex , .wallet , .wb2 , .wpd , .x11 , .x3f , .xis , .ycbcra , .qbw , .qbx , .qby , .raf , .rat , .raw , .rdb rwl , .rwz , .s3db , .sd0 , .sda , .sdf , .sqlite , .sqlite3 , .sqlitedb , .sr , .srf , .oth , .otp , .ots , .ott , .p12 , .p7b , .p7c , .pdd , .pem , .plus_muhd , .plc , .pptx , .psafe3 , .py , .qba , .qbr, .myd , .ndd , .nef , .nk , .nop , .nrw , .ns2 , .ns3 , .ns4 , .nwb , .nx2 , .nxl , .nyf , .odb , .odf , .odg , .odm , .ord , .otg , .ibz , .iiq , .incpas , .jpe , .kc2 , .kdbx , .kdc , .kpdx , .lua , .mdc , .mef , .mfw , .mmw , .mny , .moneywell , .mrw, .des , .dgc , .djvu , .dng , .drf , .dxg , .eml , .erbsql , .erd , .exf , .ffd , .fh , .fhd , .gray , .grey , .gry , .hbk , .ibank , .ibd , .cdr4 , .cdr5 , .cdr6 , .cdrw , .ce1 , .ce2 , .cib , .craw , .crw , .csh , .csl , .db_journal , .dc2 , .dcs , .ddoc , .ddrw , .ads , .agdl , .ait , .apj , .asm , .awg , .back , .backup , .backupdb , .bank , .bay , .bdb , .bgt , .bik , .bpw , .cdr3 , .as4

Extensions List Source: ForcePoint.com

Each one of the files that gets encrypted will receive the .Jaff extension appended to them as a secondary one. For example the Work.doc file will become Work.doc.jaff and the file will be inaccessible.

The encryption algorithms which are utilized by the ransomware are believed to be AES and RSA. Besides, the implemented encryption system CryptoAPI which is implemented into the Windows OS is also used for the complex encryption process.

The Jaff cryptovirus could be set to erase the Shadow Volume Copies from the Windows operating system by using the following command:

→vssadmin.exe delete shadows /all /Quiet

If the command above is executed, it will make decryption efforts harder, if you try to use a recovery method that involves the Shadow Volume Copies. Keep on reading and check out what ways you can try to potentially restore some of your files.

Remove Jaff Ransomware and Restore .Jaff Files

If your computer got infected with the Jaff ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Jaff and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Jaff.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Jaff follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Jaff files and objects
2. Find files created by Jaff on your PC

Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Jaff

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share