Analysis

  • max time kernel
    44s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 15:11

General

  • Target

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe

  • Size

    573KB

  • MD5

    503f112e243519a1b9e0344499561908

  • SHA1

    8d635ca131d8aa20971744dcb30a9e2e1f8cd1be

  • SHA256

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc

  • SHA512

    71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e

  • SSDEEP

    12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos

Malware Config

Extracted

Path

C:\MSOCache\All Users\akira_readme.txt

Family

akira

Ransom Note
Hi friends, Whatever who you are and what your title is if you're reading this it means the internal infrastructure of your company is fully or partially dead, all your backups - virtual, physical - everything that we managed to reach - are completely removed. Moreover, we have taken a great amount of your corporate data prior to encryption. Well, for now let's keep all the tears and resentment to ourselves and try to build a constructive dialogue. We're fully aware of what damage we caused by locking your internal sources. At the moment, you have to know: 1. Dealing with us you will save A LOT due to we are not interested in ruining your financially. We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you. If you have an active cyber insurance, let us know and we will guide you how to properly use it. Also, dragging out the negotiation process will lead to failing of a deal. 2. Paying us you save your TIME, MONEY, EFFORTS and be back on track within 24 hours approximately. Our decryptor works properly on any files or systems, so you will be able to check it by requesting a test decryption service from the beginning of our conversation. If you decide to recover on your own, keep in mind that you can permanently lose access to some files or accidently corrupt them - in this case we won't be able to help. 3. The security report or the exclusive first-hand information that you will receive upon reaching an agreement is of a great value, since NO full audit of your network will show you the vulnerabilities that we've managed to detect and used in order to get into, identify backup solutions and upload your data. 4. As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog - https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion. 5. We're more than negotiable and will definitely find the way to settle this quickly and reach an agreement which will satisfy both of us. If you're indeed interested in our assistance and the services we provide you can reach out to us following simple instructions: 1. Install TOR Browser to get access to our chat room - https://www.torproject.org/download/. 2. Paste this link - https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion. 3. Use this code - 8207-KO-BXVB-HKJB - to log into our chat. Keep in mind that the faster you will get in touch, the less damage we cause.
URLs

https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion

https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion

Signatures

  • Akira

    Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (8628) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell command to delete shadowcopy.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 47 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2032
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
    1⤵
    • Process spawned unexpected child process
    • Command and Scripting Interpreter: PowerShell
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1692
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\akira_readme.txt

    Filesize

    2KB

    MD5

    de49e2e3eeb866fc517949893ed74bed

    SHA1

    3b503e6776a34f026f77ba7fea719dec182575e6

    SHA256

    994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e

    SHA512

    f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8

  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira

    Filesize

    28KB

    MD5

    6e0dc3ff5dcd596e8e2a4d641c99dded

    SHA1

    ed1813b8c347e725f604e04798572f61738d47de

    SHA256

    b03f08656edf5e110798cbce446884ba5f89234c1efdc577ddca93de30e7085c

    SHA512

    65b93ed63a31c138df1b207c99258cf1e03b257357961eaea655724ef4a19f7beaca92ea3ef07f1b9a7bb7833f73db6c4e13233b7e8e264e0f3507513aab7dc7

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira

    Filesize

    875B

    MD5

    99dbe252440e9690706230a3e64a9073

    SHA1

    2fd712cfd09593d07b61f486db78eaa26828d5e0

    SHA256

    3871c52ef466c694cb90b8da9a27625f7b2fd01adaeb37f95cd06430c3267c32

    SHA512

    3ae98ab4310e835cc5047f7f53b1c69fcc21d1c232ac80cb947d06c7f4b83c5cb3c084141f0a612abeb71c906a7263551139e561a2e966d810b5cfc78175c7df

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira

    Filesize

    756B

    MD5

    58df9b3851443a54a4c3d73f51c385a1

    SHA1

    266482a3d9c04c7ad31ee7c8544caccbe306abb1

    SHA256

    09170504669934a9a429012e261bee143eba7cbd2fe7762859a252d7eb61dc03

    SHA512

    840b7a736bd2fefa644f3bb5014652c30818000a27f8561ac0602bb6b41e2246fc71f2298aaba35747e77299801895125e72c27dcb563f586ba3d2d0af782e4f

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.akira

    Filesize

    648B

    MD5

    d2dc247102d45e8cb3332973ecaaae84

    SHA1

    0ca72a2e66aa80ef46e4d33547e4c634e45c5f51

    SHA256

    ec64d0b9968c6172ff262f448c046419c34ab9330160379d62b3e3c99bf3f6d9

    SHA512

    a211e55cac82f6bd9d342f5bedd770a91da517293f8e2650a7f37e3e06b44cce04a97a6abaa94bc7124db427f6b87e7d9120cc32505ca7ce793d20b0d533d505

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.akira

    Filesize

    647B

    MD5

    d6f437aa6864e6c50a3880a17f7957b1

    SHA1

    8ba0ab6f2e1a02a9ff5b179c8176ea8c20aaefc5

    SHA256

    60a7d1a523bdff5e73e4925d727564541f8735eb73c0264a3a543fadf8ae5086

    SHA512

    4577738edfcfc7903988627a2c7ac1216b48b24353f071bd3ee09cfde7019d73cf1e9451f1cd2d0e3dfa76f1cdd24cf82b1eab760cf5e453e570712153a36d0e

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.akira

    Filesize

    719B

    MD5

    f0db580875b77370c7d81495aae41288

    SHA1

    76b531c843b1db1dba27a8b5e96d4a795ff2e64b

    SHA256

    263e985a6a1791f884af91e02042fa5e367fdb921eb100417eca203c131e2ed4

    SHA512

    fa905f31da1f40d6a5784f06547e880fe813313c56b21f0a745df566a1c553d8e999bbacb8212f614f725d143ec863a388ebc6311589049d7933f45ed2c8795c

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira

    Filesize

    1KB

    MD5

    38e55e2805ff7a3f62e39d4e6254fb0e

    SHA1

    c6f92c2d7cfb26907d811f2a3d32fd55dded45f4

    SHA256

    24497848ab79950aa472d2a816caa45e0db884d115a1592aab237c20844f24c3

    SHA512

    cb31a2c13b0729d34ef30a062540197428cde8ce2e4aa71e0ae3a65877153ca7bffc9753d8385d2c15e2eaf1ac63f990ce8f189049e41f8e2be093628ab64fe7

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira

    Filesize

    1KB

    MD5

    afc0351e360c5a8cfc21b985f9d9fa27

    SHA1

    990cbc5dcb534efb04679155578eadeb26b5bae5

    SHA256

    b404ac912418d0e1de4e1670b5b8607998b01fd9f72efe81e18651018cff586f

    SHA512

    40b2f1b835f41a7d46dd80dec8294ebf89da9ad7ce5dc64759620831213189e5cb2f6bc460d2ab3ceb0268ba95d7d2716c8cc64973e4f9496042c6d523438b23

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.akira

    Filesize

    1KB

    MD5

    01e4578043756a10802e00e1dce2ffd3

    SHA1

    58f09f466503e6f70c6705ceea3a5b95dd18c286

    SHA256

    ff1b3d367aa1b73603c49e72a72d943d86eaf5d77365a3752f2c03dcda18cb96

    SHA512

    f2494c8631732249144b3a85a75edc010f8b9cb83b91f4d48123c761967b7a16f734113f7d659e68841a45162ddd8ddbad7ee646bbaab6ed2a8554daf96ace69

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira

    Filesize

    12KB

    MD5

    897feb0a8a44aec4d73f479b42a33a35

    SHA1

    73a04349bd00ddb95f49b54ab6ca08111a0dcc10

    SHA256

    535f3bf194cce501012dd8028b155f0d4c5ddf448807df321742297b102053c8

    SHA512

    a82e2fb684ce8f37a5c6cf5d6cff36ba36a0db22f83b4434ca37da28fd24a45a50b14f1413d6e4bec8dbdfce30ac7a3e5f2e831cbf2cb96a0b3532925b9652a6

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.akira

    Filesize

    9KB

    MD5

    143ca48765f118f1d79581e58a0f0690

    SHA1

    3add758f4023d45b1b08bb349dd9ef4da4f15a84

    SHA256

    9c2ac765cc0c7267baa90dd97b7dde1d74aeb2fc7ad26b576916778c762212ba

    SHA512

    b702f5e01846a1d20f48855c348b00c82d8ce6e1e6fa0ad84b58e1073b4de8a720d652ca8735ed91fdab38c446a705bb815f04cc73f0bb93f4e51fbd45a2f2d5

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.akira

    Filesize

    591B

    MD5

    bb92c0c3e8f102521600e613c5fd852d

    SHA1

    c2e560eb833070bb1bed8c5ca15f48f5bfe7f788

    SHA256

    901d3645acdd6b504b4dad179c640246d8b9cac49b4313d7616695aac054fae0

    SHA512

    7ab7b566a4689923130917525dcda29305f511118a4f3064d63ab937886f0ed94dd3479bf7145aeadc20126bde8efd9259167b4712e3d9801231d16c2fcef4b2

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira

    Filesize

    8KB

    MD5

    eace46e4771c8b59b3b33be926c00ecf

    SHA1

    44f870bc2d699141a77ee92feadd0a2b3ddaea9e

    SHA256

    1a1e7cbcb909de7cb613b15891b7a8e20e250289939245968ccfc008ee67381e

    SHA512

    f7a44f2750ad2c5086e5ed781b9a63f6b8d4eb5a3595d2f1b38aade5786531e050b33ced3683a3a7647d9393defc1b7af8ff3b7cbbfd7b7ef1e534f7bd1e40e5

  • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.akira

    Filesize

    687B

    MD5

    69b9d581c4620b0b9e64790238eafc1e

    SHA1

    48409eca7fab14d8d1814205b5eef23d70eea20d

    SHA256

    9e2b4c5e9227a3d9f40ff316abc6ac3b78838d4c5a971d0781d3d6ea12a1cd0a

    SHA512

    7eaeee8b98600be6faa63426142e4593bee6301c3071e9ac59a61c55eb541d765fe7fe9cae9935f3839ff9bbae71f2317b15357c2334931be20451e500b02ab6

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.akira

    Filesize

    561B

    MD5

    72640df17b81ef3f778d0eb757d5e584

    SHA1

    7210357c6ee3eb1a99c3a293f3b41ede195a07f7

    SHA256

    e1cc836538acfff10785994194c423f523f7266daf5ab14625daf5fee65a0925

    SHA512

    75fab306cb791856af625b55e67885781a621dbc574c673e42cebd252269b3d13dfbe9f44fb755bce06084f28413a1941e60249ca568c5cd185f6f908fa693bd

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT.akira

    Filesize

    561B

    MD5

    e0f1b192906ac88c06e35b1a90a2ab38

    SHA1

    e68d4e7315f20955ea43e0c732057d2bbf82a664

    SHA256

    e65f73448cb7778080d6c045819161c5244011e86e9630885a5bc8c90f1fd3af

    SHA512

    9bf44d33971068540c3f0ffc1ec46c793a900c56b8712e0ad58cc11fcf6b6c06888ba6587e7db096edd25c303b3ed2dd8fabba5ed531c2c0bd40ecbc67e6ebba

  • C:\Program Files\Java\jre7\lib\zi\HST.akira

    Filesize

    561B

    MD5

    639d4f099ab8be1aeb6f061be3c69bb2

    SHA1

    505364caae83c76aec54e27b9b625b031448b07c

    SHA256

    0d93bf800c892e4dcc37026debe341d1e36bccc8cb889674e597c61492242bd4

    SHA512

    77e8ce31bed8602debb8a28ed13f7b1e51d3093ca8db49a82977d9b0a1c4dbfff0106121de80710d2046b500137468553da0465e85d5bde349fec8df2b7e757f

  • C:\Program Files\Java\jre7\lib\zi\MST.akira

    Filesize

    561B

    MD5

    687f81ff8148b6add511f7804f401547

    SHA1

    c02974f7cbdaa17371d8b5622c4861b5bf44edcd

    SHA256

    c902ba98444453568806756a305996a768218ce8363a8983f815fcb4a9c425f0

    SHA512

    ce956a16cb88eee19abd4c336033258b4e44fdbbece5bed92a9ba1f89c5deb42b391e5c11d9f4eb51a83437a8c6ae7d0a0c85714bdf2dcf0e33de85f8c461325

  • C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\vlc.mo.akira

    Filesize

    831KB

    MD5

    16b6a2cffa12e4a9bdc3b4bdda710df2

    SHA1

    52753c443139e8e88770543fb6a74738ddc2eee9

    SHA256

    6f663e7c79da91a791755ecf93fa29a2102ab0853c06b3d7a5c441d3f0c872bc

    SHA512

    d9586c00c6e76cdc89521d95eb61805d69bc0c0bcd50caaccc822729291570a03458e7a3b617793925e232b129e72807bc6a0ea1f4a9e0985c5490a01be7d5cf

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\CURRENT.akira

    Filesize

    550B

    MD5

    e69667b2d480e488a5b8fe3af61251b0

    SHA1

    d56dbf5d7ee68ac996bb028279c0683d2f065461

    SHA256

    deec2c5963d54ec339f7d776ef54e0a7bf8051afd2575dd74fd8611716afb999

    SHA512

    d1c0ae1e3ddf95f6ee617bbd6112c69f52f7faff3db0657d5c2d39072eaf324278c36834fdea0127c3b88c2bb6d4376999900dfa881a0919f4d6072977c8e875

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ETDEICXK\desktop.ini.akira

    Filesize

    601B

    MD5

    027d33b40fc61825e69645161649a41d

    SHA1

    a3a84ea125f6d77465811a7a3abc6677e74a2551

    SHA256

    694d30538514d85d067bb9cb2b2b2f0c73c831e96b5d9a5745b570e28625d653

    SHA512

    24844a42678499e313409d41cd348db24b4eef0b4bca56fc82c570f1b8ad21522d274328a263c6e559080264fc36dd82aef511a23c824341485e1a743707afec

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.akira

    Filesize

    28KB

    MD5

    eb5d6ef9bb5c9dd90841f753446f35d2

    SHA1

    8cef3f6ee1442d97fb9d78787021e6d0032ef387

    SHA256

    ed473761b3fe75be6ce56179d026f08f61fb354bdc8a3474d62ca0daf7fddad7

    SHA512

    1f91844e7f97673aa6082e96aa5f23ea8465650c1004b77f5a59b373ba7d4bef4825ced81a7655a77993ab11d5b2e87937b66ce54d837f6370aefc9de31fa229

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ckqup08y.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira

    Filesize

    48KB

    MD5

    8dbc8b446543469a737559b7d3a444b0

    SHA1

    a189d3ee5fe9e5db2b7d9ac694b410da469e72fa

    SHA256

    a2ea9f52d930e40d4f91dd4ba9173117cb8b4a8b4385b389603c31a9cc2978d8

    SHA512

    9104657a0485897523d864c31158907e04dcb685dd750921dfc0c30f64a786612eb1e07f8bfdb0755cdd98cc886ed29364b049ddc3853406515725dc8497043d

  • memory/1692-5-0x000000001B4E0000-0x000000001B7C2000-memory.dmp

    Filesize

    2.9MB

  • memory/1692-4-0x000007FEF4CCE000-0x000007FEF4CCF000-memory.dmp

    Filesize

    4KB

  • memory/1692-11-0x000007FEF4A10000-0x000007FEF53AD000-memory.dmp

    Filesize

    9.6MB

  • memory/1692-10-0x000007FEF4A10000-0x000007FEF53AD000-memory.dmp

    Filesize

    9.6MB

  • memory/1692-6-0x00000000027A0000-0x00000000027A8000-memory.dmp

    Filesize

    32KB

  • memory/1692-7-0x000007FEF4A10000-0x000007FEF53AD000-memory.dmp

    Filesize

    9.6MB

  • memory/1692-8-0x000007FEF4A10000-0x000007FEF53AD000-memory.dmp

    Filesize

    9.6MB

  • memory/1692-9-0x000007FEF4A10000-0x000007FEF53AD000-memory.dmp

    Filesize

    9.6MB