Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
Resource
win10v2004-20240226-en
General
-
Target
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe
-
Size
1005KB
-
MD5
06ade3c98aa2432458f24966509bd9a9
-
SHA1
eb997e325b1bb8df91723a137fc88659a2764de7
-
SHA256
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043
-
SHA512
9885e3c0406e720ddd3c08355ceda46957b00a866cb22afa49d3f251c0fa8a6f20db60eb99b4ae055bd13da7b67b2894e5e85b97bff2e173cfed16e15e0a68e1
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmh3:wbyxv9XQ7B3oWI+XHW6y4v
Malware Config
Extracted
C:\Program Files\7-Zip\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 5016 powershell.exe -
Renames multiple (7654) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 4 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exedescription ioc process File opened for modification C:\Users\Admin\3D Objects\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\desktop.ini 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Drops file in Program Files directory 64 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\ui-strings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ul-phn.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-100.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL010.XML 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\en-us\oregres.dll.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPMediaSharing.dll.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\load-typekit.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_fillsign_logo.svg 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ko-kr\ui-strings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ppd.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEOLEDB.DLL 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\ResiliencyLinks\Locales\gu.pak.DATA 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\en-US\about_Mocking.help.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeAppList.scale-125_contrast-white.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_scale-125.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-dark-focus_32.svg 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ko-kr\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe.config 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\PREVIEW.GIF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\rename.svg 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\adc_logo.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluEmptyFolder_160.svg 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OSMUX.OSMUX.x-none.msi.16.x-none.xml 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\inline-error-1x.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ul-phn.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.Reporting.AdHoc.Shell.Bootstrapper.xap 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\Locales\zh-CN.pak 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsLargeTile.contrast-black_scale-125.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons_retina.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymsb.ttf 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\NIRMALA.TTF 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\ResiliencyLinks\msedgewebview2.exe.sig.DATA 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\Java\jre-1.8\lib\images\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\tr-tr\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-cn\ui-strings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosWideTile.contrast-black_scale-100.png 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\sunjce_provider.jar 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-ul-oob.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ppd.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\ui-strings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL103.XML 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Windows Media Player\uk-UA\wmpnssui.dll.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\ui-strings.js 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_KMS_Client-ppd.xrm-ms 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\es-es\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnetwk.exe.mui 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\akira_readme.txt 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\remove.svg 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exepowershell.exepid process 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3904 powershell.exe 3904 powershell.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe 3372 77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 3904 powershell.exe Token: SeBackupPrivilege 1244 vssvc.exe Token: SeRestorePrivilege 1244 vssvc.exe Token: SeAuditPrivilege 1244 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe"C:\Users\Admin\AppData\Local\Temp\77068c6cfaf8b107443522757149d75400248c598f72a2dba35b1dac4639f043.bin.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:4712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58586d84e40a47f95e952032c86f68ae6
SHA12b532cceb34b75261b39cb69655b53f11437421b
SHA256873bd4c43d435bfbee3b4eeba201c637c5c64f1cb56c0e834c70e487b570c30d
SHA5126e117080d0278a9844be2d3e265f0d62cb27f1a56f75c0dc79b1cdd1af953f34c4ffcbc887eb630f5215a59dea39db1e04f183c9279023e61c6bb34871028997
-
Filesize
3KB
MD5b93a85d9660040466e4061bd74a3bd24
SHA10be656e912851436d5e802477375fb6d3f159436
SHA256bf2f1d906c92b7014b986dc945fd1413d079f15d487929c81b3f1666167b6733
SHA512681d982bb6489757478dc6d5a1859281994d428e494db18d740896f1e2b37977b6cfc07c2b4d1ef67dab90a8f16b690ad2bea0781f99c4ddc4c672771d1267f4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82