Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
427eba9f6ff2cd312c72770f13e279c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
427eba9f6ff2cd312c72770f13e279c1.exe
Resource
win10v2004-20240412-en
General
-
Target
427eba9f6ff2cd312c72770f13e279c1.exe
-
Size
1005KB
-
MD5
427eba9f6ff2cd312c72770f13e279c1
-
SHA1
221e45064829d5ca7852aa5421d5284986916d93
-
SHA256
101bd45ab673fd6547386dff4339f1649e61b9f5c318260d365f766fbdc2d3c9
-
SHA512
2101d82c1e4536536410de403bbe5b438a3688690fd3108f3c4ffc7fca90be4888b7ba088f648c68089e28e9729385ac2299d2d087f04590ff7fe6d97beb557b
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmhA9:wbyxv9XQ7B3oWI+XHW6y449
Malware Config
Extracted
C:\Program Files\7-Zip\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 2604 powershell.exe -
Renames multiple (6065) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 3 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exedescription ioc process File opened for modification C:\Program Files\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\desktop.ini 427eba9f6ff2cd312c72770f13e279c1.exe -
Drops file in Program Files directory 64 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Office 2007 - 2010.xml 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ul-phn.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MyriadPro-Regular.otf 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\js\plugin.js 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\AppStore_icon.svg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ppd.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.WINWORD.16.1033.hxn 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_cancel_18.svg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\CASCADE.INF 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-pl.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\home-selector.css 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\hi.pak 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\public_suffix_list.dat 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-ul-oob.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\mshwLatin.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.81\Locales\fr-CA.pak 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions2x.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-tw\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\it-it\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-disabled.svg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ro.pak 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons.png 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado26.tlb 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_invite_18.svg 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterBold.ttf 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nl-nl\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Microsoft Office\root\Office16\613727a9add5fb7c9a31640a34c5f485.arika 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\VisualElements\SmallLogoDev.png 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\da-dk\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial3-pl.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-phn.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_uinline_warning.svg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\mesa3d.md 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\form_responses.gif 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-left-pressed.gif 427eba9f6ff2cd312c72770f13e279c1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\akira_readme.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\ui-strings.js 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_share_18.svg 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\main-selector.css 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ppd.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription5-ul-oob.xrm-ms 427eba9f6ff2cd312c72770f13e279c1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
427eba9f6ff2cd312c72770f13e279c1.exepowershell.exepid process 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe 3156 427eba9f6ff2cd312c72770f13e279c1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4732 powershell.exe Token: SeBackupPrivilege 4864 vssvc.exe Token: SeRestorePrivilege 4864 vssvc.exe Token: SeAuditPrivilege 4864 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\427eba9f6ff2cd312c72770f13e279c1.exe"C:\Users\Admin\AppData\Local\Temp\427eba9f6ff2cd312c72770f13e279c1.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4056,i,7343566111344912903,8618626735805026283,262144 --variations-seed-version --mojo-platform-channel-handle=3892 /prefetch:81⤵PID:1436
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f48c227d88c6d8494bf4c0d16c45b628
SHA16c75df63868b452a1f8ac232fa234a5cc501c815
SHA25699ea24c4f3fe31c7e3bbf05d99058492980451a522fd6f260c920fbb4f19433d
SHA512863bcc41c912717ccc5f86350f0525f24d88fb4644f1c3324e6dbd59ccbf295966a18278f7e3c6477c66e8a8104c8cc76ea2fbc5f0f7d75c1738b29ca97132c4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82