Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
w.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
w.exe
Resource
win10v2004-20240226-en
General
-
Target
w.exe
-
Size
1005KB
-
MD5
3d18a75d8baa6693b471d0fa85a62c39
-
SHA1
2347cba8679297a3547aa0e250f48690cb18cbc5
-
SHA256
a2df5477cf924bd41241a3326060cc2f913aff2379858b148ddec455e4da67bc
-
SHA512
c925c46ea95ff2b1cf94a5bc5b8c16d1bd0ad5663e7b565a5fefe5d0cac910d132e027a008df5f79a7f261b528c73df1a29b9272abc74184c029ef8cf7428f69
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmhU:wbyxv9XQ7B3oWI+XHW6y48
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 4100 powershell.exe -
Renames multiple (8390) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
Processes:
w.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt w.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
Processes:
w.exedescription ioc process File opened for modification C:\Users\Public\AccountPictures\desktop.ini w.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini w.exe File opened for modification C:\Users\Public\Downloads\desktop.ini w.exe File opened for modification C:\Program Files\desktop.ini w.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini w.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini w.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini w.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini w.exe File opened for modification C:\Users\Public\Videos\desktop.ini w.exe File opened for modification C:\Program Files (x86)\desktop.ini w.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini w.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini w.exe File opened for modification C:\Users\Public\desktop.ini w.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini w.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini w.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini w.exe File opened for modification C:\Users\Admin\Videos\desktop.ini w.exe File opened for modification C:\Users\Public\Desktop\desktop.ini w.exe File opened for modification C:\Users\Public\Libraries\desktop.ini w.exe File opened for modification C:\Users\Public\Music\desktop.ini w.exe File opened for modification C:\Users\Admin\Documents\desktop.ini w.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini w.exe File opened for modification C:\Users\Admin\Links\desktop.ini w.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini w.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini w.exe File opened for modification C:\Users\Admin\Searches\desktop.ini w.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI w.exe File opened for modification C:\Users\Public\Documents\desktop.ini w.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini w.exe File opened for modification C:\Users\Admin\Music\desktop.ini w.exe File opened for modification C:\Users\Public\Pictures\desktop.ini w.exe -
Drops file in Program Files directory 64 IoCs
Processes:
w.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] w.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui w.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\akira_readme.txt w.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\Context.snippets.ps1xml w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\FlatFreehand3D.mp4 w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupWideTile.scale-150.png w.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\akira_readme.txt w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\dd_arrow_small.png w.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\setup_wm.exe.mui w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-white_targetsize-80.png w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-ppd.xrm-ms w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial3-ul-oob.xrm-ms w.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsSmallTile.contrast-white_scale-125.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-400_contrast-white.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Date.targetsize-64_contrast-black.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-100_contrast-white.png w.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\it\akira_readme.txt w.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\ui-strings.js w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\WideTile.scale-200.png w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ru_get.svg w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Date.targetsize-20_contrast-white.png w.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\akira_readme.txt w.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\akira_readme.txt w.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsStoreLogo.scale-125.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_tr.json w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\MedTile.scale-100.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_altform-unplated_contrast-black.png w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\ui-strings.js w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-100_contrast-white.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7d5.png w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Dark\Studio.png w.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NAMECONTROLPROXY.DLL w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Curve25519Wrap.winmd w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ul-oob.xrm-ms w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTrial-ppd.xrm-ms w.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\Staging w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-white_targetsize-32.png w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\bg_get.svg w.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-100.png w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_es_135x40.svg w.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\XLMACRO.CHM w.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppPackageAppList.scale-100.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookSmallTile.scale-200.png w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\22.rsrc w.exe File opened for modification C:\Program Files\Java\jre-1.8\README.txt w.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\core_icons_fw.png w.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\LogoBeta.png w.exe File created C:\Program Files (x86)\Microsoft.NET\akira_readme.txt w.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\akira_readme.txt w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\View3d\3DViewerProductDescription-universal.xml w.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-96.png w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial5-pl.xrm-ms w.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\c425d232bc8952fb736e885494d5e015.arika w.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\akira_readme.txt w.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-ul-phn.xrm-ms w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\TimerSmallTile.contrast-white_scale-200.png w.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\net.properties w.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png w.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui w.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Google.scale-200.png w.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
w.exepowershell.exepid process 3320 w.exe 3320 w.exe 2500 powershell.exe 2500 powershell.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe 3320 w.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 2500 powershell.exe Token: SeBackupPrivilege 3564 vssvc.exe Token: SeRestorePrivilege 3564 vssvc.exe Token: SeAuditPrivilege 3564 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\w.exe"C:\Users\Admin\AppData\Local\Temp\w.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD579cf9a3528b91cdf60af14c39d64bea5
SHA1c23166e58166bb0bf1ba091570853c226f5bbdfa
SHA25681f06e74f63da97046acdc3ddf030b1a724b90e5b82114ce872c7febe7daef74
SHA512800f1ec23d4acfe31e15638af14ef353c8b83ac6af7def2eb69792d5abcbf08c970c71c395cd364156eb8deef350b4409b28b091ee1b78e34900f4741c79506f
-
Filesize
3KB
MD57fc9236f1a610c8f69a29bdc16af4653
SHA140067e66ebd5e547e5661339f0b80f1794a4b148
SHA2562ff729a98a8bce988d897379281dce88c3b805852c3d0adb69fe559a99f93a50
SHA51200e7244fc9d9dc043ca38486de84fabfc493755dd3a442ce10e5b439a715f2c0e3b4fc196bde52c300b58407c83e8a2313007b78052b948b6b86c199fb467d8b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82