Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
locker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
locker.exe
Resource
win10v2004-20240508-en
General
-
Target
locker.exe
-
Size
1005KB
-
MD5
c9f7953e5a693b289c6a95599fcdd29f
-
SHA1
c14455c713f7d9a9b1d85cfbe9d3e244b2b81091
-
SHA256
78a9f9b794a5c59fcb603012b7404175efaa3189f6675ce2f4ac3ab78433b2be
-
SHA512
7a616ed98f2cbdf2e48df891d4b61bae90e1edf831837ec1a75fd2896a8d679953dbfa4561abd1ee3424b904c99ed3b14abe16d428f688b3ca345eaeaf7355a3
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmhm:wbyxv9XQ7B3oWI+XHW6y4e
Malware Config
Extracted
C:\Users\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 1224 powershell.exe -
Renames multiple (8644) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
Processes:
locker.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini locker.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini locker.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L54IQZD2\desktop.ini locker.exe File opened for modification C:\Users\Public\Documents\desktop.ini locker.exe File opened for modification C:\Users\Admin\Links\desktop.ini locker.exe File opened for modification C:\Users\Admin\Music\desktop.ini locker.exe File opened for modification C:\Users\Public\Pictures\desktop.ini locker.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini locker.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini locker.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini locker.exe File opened for modification C:\Users\Public\Downloads\desktop.ini locker.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini locker.exe File opened for modification C:\Users\Admin\Documents\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini locker.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini locker.exe File opened for modification C:\Program Files\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini locker.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini locker.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini locker.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini locker.exe File opened for modification C:\Users\Admin\Searches\desktop.ini locker.exe File opened for modification C:\Users\Public\Music\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ASWW3GU0\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\B5JWTXJ4\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\QE6QYUAB\desktop.ini locker.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini locker.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\desktop.ini locker.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini locker.exe File opened for modification C:\Users\Public\Desktop\desktop.ini locker.exe File opened for modification C:\Users\Public\Libraries\desktop.ini locker.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI locker.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini locker.exe File opened for modification C:\Users\Public\desktop.ini locker.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini locker.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini locker.exe File opened for modification C:\Users\Public\Videos\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini locker.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini locker.exe File opened for modification C:\Users\Admin\Videos\desktop.ini locker.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
Processes:
locker.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMABLT32.DLL locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF locker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\cpu.css locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Aspect.xml locker.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\vlc.mo locker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\akira_readme.txt locker.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\akira_readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01218_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240189.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\messageboxinfo.ico locker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\tile_drop_shadow.png locker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_snow.png locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.services_1.1.0.v20140328-1925.jar locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageScript.js locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewFrame.html locker.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\SpiderSolitaire.exe.mui locker.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\wordpad.exe.mui locker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\akira_readme.txt locker.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\akira_readme.txt locker.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\bckgRes.dll.mui locker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter.png locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WING1.WMF locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\THMBNAIL.PNG locker.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\akira_readme.txt locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\RICHED20.DLL locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Stockholm locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15135_.GIF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENGLISH.LNG locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv locker.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\hu.pak locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0212751.WMF locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA locker.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf locker.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msaddsr.dll.mui locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg locker.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\as90.xsl locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME32.CSS locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Stockholm locker.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\WMPSideShowGadget.exe.mui locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.HTM locker.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4ADT locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00837_.WMF locker.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider.png locker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\26.png locker.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt locker.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui locker.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT locker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\akira_readme.txt locker.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\akira_readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00799_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\TAB_OFF.GIF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\PicturesToolIconImagesMask.bmp locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kosrae locker.exe File opened for modification C:\Program Files\DVD Maker\es-ES\OmdProject.dll.mui locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-windows.xml locker.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\PDIALOG.exe.mui locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0237336.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\TAB_OFF.GIF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR27F.GIF locker.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\akira_readme.txt locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ulaanbaatar locker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
locker.exepowershell.exepid process 2180 locker.exe 2180 locker.exe 1300 powershell.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe 2180 locker.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1300 powershell.exe Token: SeBackupPrivilege 2664 vssvc.exe Token: SeRestorePrivilege 2664 vssvc.exe Token: SeAuditPrivilege 2664 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\locker.exe"C:\Users\Admin\AppData\Local\Temp\locker.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52b02ea392cc558d2b98c2b23f056727b
SHA1f2ade88aed313f514d04ecbf9fbaf3a255fa8ae0
SHA256f01d451137bbdc05d0a83ec8fe86c6570f8836bbcc81e5f45961308e25f2b8b7
SHA5124ab22661684c233cb8e6963ef5a8e976ad798c94ece911e984efaec7b0ce89d5f293210356e6447fb2ff37719a8b94cfc89414029586c3511a252f2c47f5460b