Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
Resource
win10v2004-20240226-en
General
-
Target
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
-
Size
1005KB
-
MD5
06ade3c98aa2432458f24966509bd9a9
-
SHA1
eb997e325b1bb8df91723a137fc88659a2764de7
-
SHA256
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043
-
SHA512
9885e3c0406e720ddd3c08355ceda46957b00a866cb22afa49d3f251c0fa8a6f20db60eb99b4ae055bd13da7b67b2894e5e85b97bff2e173cfed16e15e0a68e1
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmh3:wbyxv9XQ7B3oWI+XHW6y4v
Malware Config
Extracted
C:\PerfLogs\Admin\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2004 powershell.exe -
Renames multiple (8586) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Videos\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ASWW3GU0\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L54IQZD2\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\QE6QYUAB\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\B5JWTXJ4\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Music\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Admin\Links\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Documents\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Music\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exedescription ioc process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent_partly-cloudy.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00345_.WMF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\vlc.mo 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_up.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02466U.BMP 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\localizedStrings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\La_Rioja 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\TipTsf.dll.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02048_.WMF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\TAB_OFF.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\header.gif 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPIRMV.XML 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Perspective.thmx 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_OFF.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.RSA 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\Minesweeper.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\currency.html 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_hov.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_zh_CN.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Mail\en-US\msoeres.dll.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10337_.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\Mahjong.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Common Files\System\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR48B.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285796.WMF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Windows NT\TableTextService\de-DE\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Common Files\System\MSMAPI\1033\MSMAPI32.DLL 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_ja_4.4.0.v20140623020002.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BULLETS.DLL 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15169_.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Java\jre7\lib\applet\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV.HXS 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\whiteband.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recife 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\add_over.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME32.CSS 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACTS.ICO 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\2d.x3d 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\ImagingDevices.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\include\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\FlickLearningWizard.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Grand_Turk 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\CHICAGO.XSL 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_ja_4.4.0.v20140623020002.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\TAB_OFF.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\PDIALOG.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WWINTL.DLL.IDX_DLL 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fakaofo 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exepowershell.exepid process 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3044 powershell.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3000 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 3044 powershell.exe Token: SeBackupPrivilege 2652 vssvc.exe Token: SeRestorePrivilege 2652 vssvc.exe Token: SeAuditPrivilege 2652 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe"C:\Users\Admin\AppData\Local\Temp\77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58586d84e40a47f95e952032c86f68ae6
SHA12b532cceb34b75261b39cb69655b53f11437421b
SHA256873bd4c43d435bfbee3b4eeba201c637c5c64f1cb56c0e834c70e487b570c30d
SHA5126e117080d0278a9844be2d3e265f0d62cb27f1a56f75c0dc79b1cdd1af953f34c4ffcbc887eb630f5215a59dea39db1e04f183c9279023e61c6bb34871028997