Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2023 16:49

General

  • Target

    2084ab8f92a86a37a35879378610949e21ea7b5030313655bb82fe6c67772b0d.exe

  • Size

    573KB

  • MD5

    d7aa8e838d85ac9fcbef1cc7f55dccbf

  • SHA1

    93a202bdc9782283612fa1ee9b4f060ac01739e3

  • SHA256

    2084ab8f92a86a37a35879378610949e21ea7b5030313655bb82fe6c67772b0d

  • SHA512

    184555ed8955e4af075a0618bc45030ebdb1bb5626dee8c0ba96fcc4e8749b265adfbf107da60be90394a635cb5b5c5dacb5e345e9fa8f7eca49d3c7ca960a1a

  • SSDEEP

    12288:BV0qnXKTH2P6rxTcQpXDHgswvodgxAdA:BV0EMm6rxTcQjos

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (8565) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 47 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2084ab8f92a86a37a35879378610949e21ea7b5030313655bb82fe6c67772b0d.exe
    "C:\Users\Admin\AppData\Local\Temp\2084ab8f92a86a37a35879378610949e21ea7b5030313655bb82fe6c67772b0d.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2332
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
    1⤵
    • Process spawned unexpected child process
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2964
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\fn.txt

    Filesize

    2KB

    MD5

    82b56c15961d59d5343354191d25ed15

    SHA1

    5c12f593321996bd70a384a0c3c3deeb596da9ee

    SHA256

    25f8c16280ab68bc7c5122e475cab12f9a96e8f7369b3899e4ee344c72a158ca

    SHA512

    e176e9922b2eb95d3ba666f188e0e3a35658f8c7e5c42506926f634c1cc881ea57cedf8f049de24c496bb30b19754e326d63150ff35a07789e6f47e582bde2c3

  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira

    Filesize

    28KB

    MD5

    caabce23b9a6e825e919d563b210e22b

    SHA1

    1b85de971156b4c751811023cbeec7be56fa8d4b

    SHA256

    88c69e3fec10bc2ec3295ba3a47f95d8c6f15e3da3c5e97403d6d8e29b02fed8

    SHA512

    8c3f9c3ad27a07d523992b6aa28021b8bea06ef1f6f03b8ac3f2061b468f887d19484fa61201a2ae958a9deb837622f7a9b776256e29a59834481393143f1d4a

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira

    Filesize

    875B

    MD5

    188e747442c6d3f985ce78571e10bd0f

    SHA1

    65202657748dac44c603e75e896389c11b925c6a

    SHA256

    79037197f6ec9164817a72559549ba309363af19c3846c6b506925db970fe294

    SHA512

    0eb011305dcd306790893c9890cc9835333fc052bdec016b8996b7e6f8d72cf1260c817f531d362d5deab34eee572c9cc0dfb58cbb5fe97f022037f10f04f88a

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira

    Filesize

    756B

    MD5

    74ba040e9225d412a6666dbd682601e4

    SHA1

    ded4a36325b98267f77f2a0528021a94a6fecc61

    SHA256

    d479b733f78f412cc8aa0dde7980db9628c9aced10a3dca0f4b6f059bed5a63f

    SHA512

    26b7220fde80a3f02e8b47670b1656f93a0f5223d66466454b47a71ee3fa8e86ce957e0b9ef613e71e10de3bbebfbc62bbbb979c647e69f92c303dc98ae668e4

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.akira

    Filesize

    648B

    MD5

    6d303a705931704a24902a0e3df5c582

    SHA1

    986d6bc89f83e26e48eaccd69ea2960641b4aac4

    SHA256

    8ff5cb738d84f8cf3d1997001f6c664b2a91800cf9831ff149139357c67ad2e8

    SHA512

    d616412c7266ce3f18dc6c2c9f3b0e8082d149e84de0d9eaa4e6aed7c548bb38eabc6de2210b9ee23e7fc078bc7f9ec35224c96603e4845b8aab131e79fc1daf

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.akira

    Filesize

    647B

    MD5

    c778b77f2efc2100abd38066de21e1f8

    SHA1

    bb8ddb79a296fbc6b03674c5c9a2705cb219dc63

    SHA256

    40823958b5f9b7f127f2d6a6138742d1203d7a9b4388ce46e54c419fddbcafb1

    SHA512

    882e2d8ce3364de62eb11c3ba33ac3c35b5db318b65e72d2a27733165733fa4fb4238a0c61d0e00f661c0896c8db77e3e8c8810150a76d8c4f87671f4a4be11a

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.akira

    Filesize

    719B

    MD5

    6fe03fcb500ddd7fc2a3cfc73fbc3470

    SHA1

    b89aa80df0ebf3baa46304b6ce75d22c54b4ba50

    SHA256

    44d4d6501189a0858a30fe732b45412d04704af437ed6b4f7f945ccc8dd2a889

    SHA512

    8c34ede13f4485da4a434504fbb72500d7f0a1eabf440292082db8a4dab2d6bd98bbb1ccc8b63b14a6856ce6fcfc09cfe747b4928da13c926c51ab4bf716e013

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira

    Filesize

    1KB

    MD5

    46dc34219b9f7e2b65f8620041576180

    SHA1

    9657092c4aabac42d02908af3ee6df8d0d06612c

    SHA256

    f7af599525bcb1f47f118f06a706710481a83b37ce67de71ccf5b38d98a6348a

    SHA512

    8e9084f42f6f542a1a5b7f5860a83e3b0f4c2e1c8d3b3955b69105810603cd46fe29e95a677bc2c870dbba7c841bd4d2adb8ba93a37c34238dba97225c52f482

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira

    Filesize

    1KB

    MD5

    bf86a49467dea5c80698c15e38520ba9

    SHA1

    f9d0f9acf806d54c7e0ebc4962c4178ba520b564

    SHA256

    3aab051b0bfb279e004fb0a12ea5564ab0bdae306486eef25fef347cdd502945

    SHA512

    781a2654ee015e42b810b0fe3e829a9414ea5e29b88d6b2e87887f7202496490dbb2bd2fe275d5820e16d953d56d69ed3441aa85cfebebe208994363f1bfebc8

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.akira

    Filesize

    1KB

    MD5

    4fed1df33ad015c478e05a65dd47bc33

    SHA1

    372591c91598065c18057570256bf85ccd7d8bc3

    SHA256

    ca42f4b4f5b7cd12af0562b02ddf0452dbef7dc86156695f8b5da1af4a4e3021

    SHA512

    ecbeb00245d1f76e36a7967bba723777a694af21c5f9f5027ee395d4a1d895ad513378c595891eafed824764d8bbe739cfe83b806f5332c5abf9f15640152cfe

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira

    Filesize

    12KB

    MD5

    a06029a036ee99fc930947adc8105eb2

    SHA1

    fb56c7a9121d790478e5d0bd842c18183613a819

    SHA256

    4eff267bd28d04d9ff600804b8619a96dc1613ac3b563967ac9b58935333beee

    SHA512

    07c44638e5f076e7e24811d3e2d62b11da6ca9ca4ce48e046c411bfb40908d1a166df83d65d72c7150cbd631878eb05b5eef0ea7ecabe0772aeeec283239a8ae

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.akira

    Filesize

    9KB

    MD5

    f81c7bd32749a109a917336530630954

    SHA1

    0ac0399378094572482bc52d00be78c870baf422

    SHA256

    12a0777a4e00ff20d0d43bf9795a3fb11b497fad1b9084ec57c41a189f0b4bfe

    SHA512

    38586fe55b87326895b097af9d907056f16c5bf7d8c9c6238fd59de2bbb6434b114df5889072a6865fa7a1258f223a3d92930df4e63d09b0a514d6d91aec4657

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.akira

    Filesize

    591B

    MD5

    2d2539c16423ff7a808eeabfa20d81af

    SHA1

    842dc1d961880a8a9965717a16cfd42066cba15a

    SHA256

    c8433e55714701e82a6ded1ff2b6fec80da03bf3d95675be893faa54a4b9ccb0

    SHA512

    8de7cb8b6e82406c4b6730172fdec13d030a3989476c7f52f52a6b3338113b27a7c4c134d2b0d259122936853d59158b3e6bb5f167cd2d5b83878b835de8f83b

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira

    Filesize

    8KB

    MD5

    db9fad7809bd7660e6a402711f613ca5

    SHA1

    ab0b8d05162c7f2e529d03fd50f856924afc047b

    SHA256

    e5d73a482e3a1339ddaa832041621b1fa5982ede511ce532365d4f7ed81184d7

    SHA512

    ab1f8096d988bb798d5a92c0f4a5188f735987f200620594426bfadbb663d079851099b9b4cc1ee2ca2d43a6efd8b435a04084982392af2caf9b337ad8bca0d0

  • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.akira

    Filesize

    687B

    MD5

    3c6c69cc4a16ec356d196abf96377691

    SHA1

    e549bbf7346853a2eb8fc1fd298ee6df013b244a

    SHA256

    8e3756491ed38e4b13c088f126c78588b0384db0f3c985be7bfd81df907b4659

    SHA512

    76e41d963b35cdec87372091157cee35fdcf9e7e9c4f0d492af13c72fead564167e4e56ff2e9a761a109193ab01f1e0a22e790a886952b3b32c1c4fde4d4160f

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.akira

    Filesize

    561B

    MD5

    4ce61dba94adf0eace112a644ea7eca5

    SHA1

    7a457ab31c07cc478e4adbd1ecdeb0e86e861d7d

    SHA256

    a53fa98c1b4bdf43ec2030a61a201a63bc2c990441284459b093b77c82eb923e

    SHA512

    fdb8b98b9715c70efb3ad5716b760ff4cd6db1b81300d74325bcc22c898c19720e990bafa6127f6653a17caa740a1d55988e1a90dee1e8a00357eaa76a1be72c

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT.akira

    Filesize

    561B

    MD5

    8f2b90124801903a17ff9da1fa318c3e

    SHA1

    c0f82261912c5f6a35bc315a2072aaaa2b6a146e

    SHA256

    b9d935d03cbe09bcae4a613129054f9cd05984fa5a99634f2a8deee73829102a

    SHA512

    4297c0640919aa1099bcaf7458efc937c76e1ba810e91293a0eacb21b6bad187cee150185092933f5c27aef50b76b8a40b6415f2347944d497555fd6801cd5ac

  • C:\Program Files\Java\jre7\lib\zi\HST.akira

    Filesize

    561B

    MD5

    7837db112fbb2f3a60c89eb6acea7346

    SHA1

    5877e0d7e164c0d784852d2308e8438b150967e6

    SHA256

    d01c060ca9129f3522f4de3cdb645c6eade74c65363c584e78e3986ae7c7bdc3

    SHA512

    559bbde87b24b4333770f43aa341293a719ac7a836b1968a1290c87754555c2344d0465526b431e8b305befbb29d8d5f5d9bfffbe020fe7015a78c521dbf89ee

  • C:\Program Files\Java\jre7\lib\zi\MST.akira

    Filesize

    561B

    MD5

    1ef19e7a1d2263dbff7d400942921acc

    SHA1

    7259e2031234fa20b21f25987f4c2a1c8e597a2b

    SHA256

    d43e3b692557b8bd5d8e6331900857d5fd25db1b0fe9c1b17f9afe1936591036

    SHA512

    9326273871df6319d448cd7e92776150584e53252a16b6cbc223b49d530c0edb5ef820bcfc796c7cc8c42ad7f3633103cfb11cd922fe66b998d4de9dfdaca813

  • C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\vlc.mo.akira

    Filesize

    665KB

    MD5

    dced00150e5af42bba8d273585106e3b

    SHA1

    77c715d4d969852284dcdfa60214e5f87c22267e

    SHA256

    24e5df04abe78aad6855c599723eb2eba1e9c3adcce3d071060904e184d39415

    SHA512

    0ac03e02921612b6e9b5dc9fbbc9c23b00092d60bd9e34508ef52c78d993d7a6a1cf97cc7d6c5eabcc352d77eb2d63917516f85b9121c524a70851447e3503b6

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\CURRENT.akira

    Filesize

    550B

    MD5

    2aaa70e05cda921e0478c3633daf409d

    SHA1

    0b416c4757e119b6b54a4fce3480eafcc3027686

    SHA256

    f08a7d9b800ee14165e92820c740cea2f5d207eb7a9fc30feb9e3620b2b3a7f6

    SHA512

    d2b2d6ca72052a86703676430715d4f6cf4cfba75b2ba93220215650a5e02d832fed1746d2c7f02e455956d8c351aad51df9a630deb168809e61985e5cf5d565

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\WIDEASP2\desktop.ini.akira

    Filesize

    601B

    MD5

    8996ad345d419d4738d5eb36eece3f17

    SHA1

    4f9b31eb1290257893984633791664ddba449170

    SHA256

    50c3d51b62a8707715b192991d02dd7814883a72ea9a911a04e6d49fef3311c9

    SHA512

    32a70735e543095d0f1337bf168b838280011402429bf88879259bf61d2511988871ed8e1c2833bc318ce69986378b302313180cc11c53e2105326252d27d7a7

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.akira

    Filesize

    28KB

    MD5

    f280a805a044a1fa9d137fbb969ec8bd

    SHA1

    3ca8d2edf953affe3f5c45a09a4a347abd1e4bdd

    SHA256

    c47a8aa8b1827ae314e64fbb9764ff020fd729ca7a7e51fd15b4f85c54d18746

    SHA512

    2076f03aa1b62256b2ba0ffe62dea3c9965a3018385329bfaf77f4a2429ff9c3605492607267ea7487534c3ba5f0f2fca0001246facbb700ab843b11a1ac35e2

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zlzfh75j.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira

    Filesize

    48KB

    MD5

    7e250f60d86e463ce4943bc3e5755d85

    SHA1

    e38d1005dce20f57aa7fd21747c696a66960bd1f

    SHA256

    c3846b82b6cc92bec28ab4edaf5b22b3da1d588ad926effed5a00d90637fa5a6

    SHA512

    82ddba48bae76582e0a6539818118592bb17c340af2148d9aa51d08d344ead9f5fedd30f8252e503fc06c856583829ca6b7486b907beaca7d1d6821e8abcc3cd

  • memory/2964-9-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/2964-4-0x000000001B340000-0x000000001B622000-memory.dmp

    Filesize

    2.9MB

  • memory/2964-6-0x0000000002360000-0x0000000002368000-memory.dmp

    Filesize

    32KB

  • memory/2964-7-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2964-8-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/2964-5-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2964-10-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/2964-11-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/2964-12-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

    Filesize

    9.6MB