Acronis Cyber Protect Home Office
formerly Acronis True Image

The Rapid ransomware variant began attacking victims at the end of December 2017, according to the ID ransomware service Malwarehunterteam. This ransomware strain is interesting and unique because it keeps running even after encryption is completed, and continues encrypting files once they are created. Our team analyzed a new sample that was compiled a week ago.

Static Analysis

The version under analysis is a Windows PE file and was compiled on January 18, 2018 (MD5: 46f5092fcedc2fee4bfbd572dd2a8f6f).

Rapid Ransomware - Analysis


Rapid adds a reference to itself and a ransom note to the Autorun key:


‘Encrypter’ = ‘C:\Users\IEUser\AppData\Roaming\info.exe’

‘userinfo’ = ‘C:\Users\IEUser\AppData\Roaming\recovery.txt’

Rapid Ransomware - Installation

Key generation

First, the Rapid variant imports the encoded master public RSA 2048-bit key, decodes it, and stores it in the Windows System Registry.

The encoded master RSA public 2048-bit key:


Rapid Ransomware - Key Generation 1

The decoded key in the PUBLICKEYBLOB format is ready to be imported to the Microsoft Cryptographic Provider:

Rapid Ransomware - Key Generation 2

Then, Rapid checks if the ‘local_public_key’ value is available in the System Registry. If not, it generates an exportable RSA 1024-bit key with the following flags:


Rapid Ransomware - Key Generation 3

After that, the cryptolocker exports the generated local RSA key pair.

Rapid Ransomware - Key Generation 4

Then, it encrypts the PRIVATEKEYBLOB with the master public RSA key imported earlier.

Rapid Ransomware - Key Generation 5

The encrypted local RSA key pair is stored in the following registry key as ‘local_enc_private_key’:


Rapid Ransomware - Key Generation 6

The ‘local_enc_private_key_len’ contains the key length - 1024 bits.

Then, Rapid exports only the public part of the local RSA key pair and stores it to the same registry key.

Rapid Ransomware - Key Generation 7
Rapid Ransomware - Key Generation 8

The cryptolocker then reads the local RSA public key from the System Registry and imports it to the cryptographic provider.

File encryption

Before encryption, Rapid ransomware terminates the following files to unlock the database files:

  • sql.exe
  • sqlite.exe

It starts multiple threads to encrypt all found files on fixed, removable, and network drives. When searching the files to encrypt, the cryptolocker checks for the following files that should not be encrypted:

  • How Recovery Files.txt
  • recovery.txt
  • Info.exe
Rapid Ransomware - Encryption 1

Rapid ransomware uses the AES crypto algorithm with a key length of 256 bits to encrypt the files.

First, it generates a unique AES 256-bit key for every file and exports it.

Rapid Ransomware - Encryption 2
Rapid Ransomware - Encryption 3

Then, the exported AES file key is encrypted with the local RSA public key.

Rapid Ransomware - Encryption 4

Finally, the Rapid variant encrypts files with the AES file key and writes the encrypted content to the original file.

Rapid Ransomware - Encryption 5

After that, the cryptolocker adds a footer to the end of the file that includes:

  • original file size
  • encrypted AES key
  • encrypted local (session) RSA key pair
Rapid Ransomware - Encryption 6

And adds the extension ‘.rapid’ to the original file name.

Rapid Ransomware - Encryption 7

Rapid does not terminate the process and restarts the encryption threads to search for newly created files.

Rapid Ransomware - Encryption 8


Not available.

Backup removal

To remove shadow copies of files and disable automatic Windows recovery, Rapid ransomware executes the following commands:

vssadmin.exe Delete Shadow /All /Quiet cmd.exe /C bcdedit /set {default} recoveryenabled No cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures

Ransom note

The ransomware creates the text file with the recovery note:


It also leaves ‘How Recovery Files.txt’ files in the folders with encrypted files.

Rapid Ransomware Note

Decryption service

Once a user contacts the cybercriminals by email, the ransomware master will suggest sending up to three files with non-sensitive information, together with ID, to this email address to test the decryption service. The file size should be less than 1 MB in size. One of the files will be decrypted as evidence that decryption is possible. The ransom value will be set in bitcoin and may vary.


The Rapid ransomware strain implements a conventional ransomware encryption model, leaving no chance of decrypting files without knowing the master private key. In addition, the ransomware process keeps running in the memory and continues encrypting new files created by the user. Following the trend, it deletes Windows backup files leaving no chance for unprotected user to recover.

The only way to protect yourself against ransomware is to make backups of your files and have technology like Acronis Active Protection running. Using Acronis True Image 2018 or any of our other products with Acronis Active Protection enabled will detect and stop Rapid ransomware, while giving you the ability to restore any affected files in matter of seconds.

Rapid Ransomware blocked
Rapid Ransomware - data recovered

About Acronis

Acronis is a Swiss company, founded in Singapore. Celebrating two decades of innovation, Acronis has more than 1,800 employees in 45 locations. The Acronis Cyber Protect Cloud solution is available in 26 languages in over 150 countries and is used by 20,000 service providers to protect over 750,000 businesses.

More from Acronis