Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
427eba9f6ff2cd312c72770f13e279c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
427eba9f6ff2cd312c72770f13e279c1.exe
Resource
win10v2004-20240412-en
General
-
Target
427eba9f6ff2cd312c72770f13e279c1.exe
-
Size
1005KB
-
MD5
427eba9f6ff2cd312c72770f13e279c1
-
SHA1
221e45064829d5ca7852aa5421d5284986916d93
-
SHA256
101bd45ab673fd6547386dff4339f1649e61b9f5c318260d365f766fbdc2d3c9
-
SHA512
2101d82c1e4536536410de403bbe5b438a3688690fd3108f3c4ffc7fca90be4888b7ba088f648c68089e28e9729385ac2299d2d087f04590ff7fe6d97beb557b
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmhA9:wbyxv9XQ7B3oWI+XHW6y449
Malware Config
Extracted
C:\MSOCache\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 1632 powershell.exe -
Renames multiple (8561) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exedescription ioc process File opened for modification C:\Users\Admin\Desktop\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7GUSN8UJ\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Videos\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\U6FX44QQ\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YSYAJTCS\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Links\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Documents\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Music\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\K9KFIAQ8\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Users\Admin\Music\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exedescription ioc process File opened for modification C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\picturePuzzle.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor_1.0.300.v20131211-1531.jar 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\prev_rest.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MAPIR.DLL 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL082.XML 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00546_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00211_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImage.jpg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\TableTextService.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18226_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFRHD.DLL 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dushanbe 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03011U.BMP 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InputPersonalization.exe.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\MSOINTL.REST.IDX_DLL 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02071_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\meta-index 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\PREVIEW.GIF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200279.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBAR11.POC 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonDown_Off.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre7\lib\management\management.properties 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\TableTextService.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Eirunepe 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Marengo 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\MSCONV97.DLL 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ko_KR.jar 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00077_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Adak 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.zh_CN_5.5.0.165303.jar 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder_5.5.0.165303.jar 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ODBCR.SAM 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00808_.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\picturePuzzle.css 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\dial.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105490.WMF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Vienna 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\micaut.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbvbs.inc 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.fca 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\MLA.XSL 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OriginFax.Dotx 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\MANIFEST.MF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_ja_4.4.0.v20140623020002.jar 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_zh_4.4.0.v20140623020002.jar 427eba9f6ff2cd312c72770f13e279c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exepowershell.exepid process 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 3064 powershell.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe 1300 427eba9f6ff2cd312c72770f13e279c1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 3064 powershell.exe Token: SeBackupPrivilege 2800 vssvc.exe Token: SeRestorePrivilege 2800 vssvc.exe Token: SeAuditPrivilege 2800 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\427eba9f6ff2cd312c72770f13e279c1.exe"C:\Users\Admin\AppData\Local\Temp\427eba9f6ff2cd312c72770f13e279c1.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f48c227d88c6d8494bf4c0d16c45b628
SHA16c75df63868b452a1f8ac232fa234a5cc501c815
SHA25699ea24c4f3fe31c7e3bbf05d99058492980451a522fd6f260c920fbb4f19433d
SHA512863bcc41c912717ccc5f86350f0525f24d88fb4644f1c3324e6dbd59ccbf295966a18278f7e3c6477c66e8a8104c8cc76ea2fbc5f0f7d75c1738b29ca97132c4