Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 16:58

General

  • Target

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe

  • Size

    573KB

  • MD5

    503f112e243519a1b9e0344499561908

  • SHA1

    8d635ca131d8aa20971744dcb30a9e2e1f8cd1be

  • SHA256

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc

  • SHA512

    71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e

  • SSDEEP

    12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos

Malware Config

Extracted

Path

C:\MSOCache\All Users\akira_readme.txt

Family

akira

Ransom Note
Hi friends, Whatever who you are and what your title is if you're reading this it means the internal infrastructure of your company is fully or partially dead, all your backups - virtual, physical - everything that we managed to reach - are completely removed. Moreover, we have taken a great amount of your corporate data prior to encryption. Well, for now let's keep all the tears and resentment to ourselves and try to build a constructive dialogue. We're fully aware of what damage we caused by locking your internal sources. At the moment, you have to know: 1. Dealing with us you will save A LOT due to we are not interested in ruining your financially. We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you. If you have an active cyber insurance, let us know and we will guide you how to properly use it. Also, dragging out the negotiation process will lead to failing of a deal. 2. Paying us you save your TIME, MONEY, EFFORTS and be back on track within 24 hours approximately. Our decryptor works properly on any files or systems, so you will be able to check it by requesting a test decryption service from the beginning of our conversation. If you decide to recover on your own, keep in mind that you can permanently lose access to some files or accidently corrupt them - in this case we won't be able to help. 3. The security report or the exclusive first-hand information that you will receive upon reaching an agreement is of a great value, since NO full audit of your network will show you the vulnerabilities that we've managed to detect and used in order to get into, identify backup solutions and upload your data. 4. As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog - https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion. 5. We're more than negotiable and will definitely find the way to settle this quickly and reach an agreement which will satisfy both of us. If you're indeed interested in our assistance and the services we provide you can reach out to us following simple instructions: 1. Install TOR Browser to get access to our chat room - https://www.torproject.org/download/. 2. Paste this link - https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion. 3. Use this code - 8207-KO-BXVB-HKJB - to log into our chat. Keep in mind that the faster you will get in touch, the less damage we cause.
URLs

https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion

https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion

Signatures

  • Akira

    Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (8623) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell command to delete shadowcopy.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 47 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2856
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
    1⤵
    • Process spawned unexpected child process
    • Command and Scripting Interpreter: PowerShell
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1980
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\akira_readme.txt

          Filesize

          2KB

          MD5

          de49e2e3eeb866fc517949893ed74bed

          SHA1

          3b503e6776a34f026f77ba7fea719dec182575e6

          SHA256

          994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e

          SHA512

          f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8

        • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira

          Filesize

          28KB

          MD5

          1b7500451276c1864470ac1cca0bc22d

          SHA1

          0edbea950d2d45c10f31d76655fd680e9340cdd5

          SHA256

          3f66f8fdc1298495b71c0495ba9892984d728d01c61f3481e049f9c885ee3f8b

          SHA512

          717b1ce80edfbf46a5d72a1bb884cf8d671f8114158b146ff48d0994ea65c1508c4d42716b36a2a36b1fffaa0520572afc2b1ea6b6c4a333f85bedc26ac82c2f

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira

          Filesize

          875B

          MD5

          e9c31cf8f3bc0b5220b86e89ea9467bc

          SHA1

          8fe4c24851712a6102a6bf1b5f8e8e30611967c6

          SHA256

          495c5e50ae939e924234717a97c1c0831ac759e276a15448db1e1448c73d5407

          SHA512

          59db1c0dd2e23a0c14e2bf57fd89e5d226f0efb1434eaa526e9d5d1145360baea3d08ef558ed5419a78256db077ef5c4f07be82370a1df48ab431c1fd1c68925

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira

          Filesize

          756B

          MD5

          1e29c791793adff806e590eec8825237

          SHA1

          de0a22213f53af914f584c3d5461a0d49601d9fb

          SHA256

          a0a4915c05778c59a5deff93f8c5390dc7a4ab05720835210a4c9d30cd7020db

          SHA512

          2c97b620d5df913330f6d13f0de4183f83819fe22598d7621719830278661564c5e91d4e7421abc08fb7a6b0a019f5e0dddcc6226dc09d32919c5195c09c9a2c

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.akira

          Filesize

          648B

          MD5

          9069ebb2bba73570cc67348887182343

          SHA1

          7cd0bce978629764870c4f04c0d19ca557ac1500

          SHA256

          28ef7c8518cda39f3da615827a55b5467d4a508b99d36662ad15fc1f17c2083c

          SHA512

          01a484cf65dda61e4de713572406dcd00a53a052520fa6301980a7f95742a41268b579a606c659e40deacf59d72873ad76a40311b5094dba57559c17d2ddb03b

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.akira

          Filesize

          647B

          MD5

          d6b03d9ce4f59f79eb9579a14b7ed7ec

          SHA1

          2a20ba5fe5c9d180330c3e20204d85ca9d407796

          SHA256

          1515bb2850f2b297b87efd2e8f3080f93de6d3431e013b2dfb4f66de647d4655

          SHA512

          cd974697eeb121d4e93f7e3564211cd10b151c59600c2f54751a0266e8f25f066d3a8ec721f1bdc578c7b1d9e71c0cfd932dbe795049762f293d24d607fd74bc

        • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\BUTTON.GIF.akira

          Filesize

          719B

          MD5

          9f6847327b3bf83289de7c1826a0b1ed

          SHA1

          5e7ff79afe9ac1d1f7fffe4620fdc96e01deca2e

          SHA256

          1b1123a4f5a2cc1cf2074089cd14f45e3f5d306aea1ea5878acb3e274ab7f47a

          SHA512

          a2fb371df392778ae20a154d2cc62e6f08985f97c6974533ce5f2f4f9bd0a0f8e5abdfe3fce02918fc7369ec4a64c0ed30bd57ad0199b80100e362fb8f1c50e4

        • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira

          Filesize

          1KB

          MD5

          126edaa6967e73e06849ad4f3a66c328

          SHA1

          23caed6dcc46cedd513394de39e233fbb808cb1a

          SHA256

          e0ef7948c8274e659ea1a34bfd7c1a64fcedda0843d175187fe196cea1ed9aeb

          SHA512

          f0ac877c3a3908a6ce58459a767fca10ce85513ffad9d388e36c913e3adea147363178145bdab49e84f02b47aa6fbc4fb300db90b764ecc9987d2a4a98c4b165

        • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira

          Filesize

          1KB

          MD5

          ca4a86213d9703d1e3d03c0485968d81

          SHA1

          4ce5676886576ab9dcb2abea0a335367618da7de

          SHA256

          eb5d394cfb6b0475e7910ec17a500892fa6ef1373dda14dbedce1701472739cc

          SHA512

          134ccb04f096cc99c50d25c682315cbb247573ad7f7359fb3e36b51fb171ed4121974c7fdd654ce8c095f36793f8fe4c27932934db506b71a4b4fcfecb7d6b5d

        • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.akira

          Filesize

          1KB

          MD5

          2faa51c30ab62f5b8cb72a954dddb8b6

          SHA1

          3462f2c7f2b11bce00a93406fffcddacecf5e9da

          SHA256

          022e61a079c03f0b6bcdb6c2302a2e84f5913524d228fe4b215492fc9dd73aae

          SHA512

          56dbe27ed719f9a664354dc1aac3b08ffe1b0c77527a8191c23223746c25d16f0ee1b5b5defd4f503d01ad0ea8e4d0f8272e67d86286bab0a57b269af232a17e

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf.akira

          Filesize

          591B

          MD5

          f3d0d788a049f643e9a8e95212807f13

          SHA1

          6154dd1c67247873c2d8645cc256f403dd7417fc

          SHA256

          845e89041b911cafce064f55932cb38ca3ee730953bef33948bded450e3c05cd

          SHA512

          3c0119460c983ba2e9826627d4f8d2b9c5c9e3cf9a6d4c9c007a8da13d64d4eb8436fdecad054ca076507e8c90847510b9b1cfd7dd6eb5ee8c831727ef360fc6

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira

          Filesize

          12KB

          MD5

          5d4c6eb521aa62ae4d1393f7081c100c

          SHA1

          b18bd7d9433febde19d627c00cc7b85108ae45a3

          SHA256

          38be1eb7df357a928d94ae548d360779e3fac35029fa414fa7a85d47ad2c07ab

          SHA512

          abca9a1ad5e7f9e45a9b1ac7dff2b1983da5eaa0e436044908c76a452cf97a11af6fe88fef08c0e5724fdb8bf64a0ae906913274a1a847aa9942f1816abbfe09

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.akira

          Filesize

          9KB

          MD5

          297d18f2bab8f0ac047ce6dcbfa23694

          SHA1

          6fd09e04ab7591c1d10bcfa863b17876039f2704

          SHA256

          3218f6ffdfe8d00aa491f75b97cfa8a72481efb6e466c3c1dfead5812abba8b7

          SHA512

          4c8dd64979e17d34242e1a772e0f0d681ae6dfc363dd3494cad3396571212680258c9b936eaa4f2a693e095a3a18b694da4010f5cb8b68f4cf7144e725fbaa93

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira

          Filesize

          8KB

          MD5

          d02df45fd88a16d994e261415609f468

          SHA1

          5868cf2e46294fbf84f1f6ce7f3ff64c811dbe0e

          SHA256

          ffa0c751e5d101f9e7b1710e5ae7ffed32d25e0fd17aa019b5975bd93407e945

          SHA512

          ccd6c4bce3d05490af6828d362a3677eadc2749582336ad1ca10be84d88f4588a3a7a51705d802609ba9f437a0680a2eb3bb5677a3965257af3e49b7e3038243

        • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.akira

          Filesize

          687B

          MD5

          79fae8a583b56bca89b7a7a905562209

          SHA1

          14e51c61bfa505e9f8ae0bf9c0e8778be4912c40

          SHA256

          c01d730c8c8cbc818334420b82ecf6751de0658164cd664cf8eac96a5f35dd74

          SHA512

          a05e03e3f982d9eeadc156c673f58c18b542860e19e26622113b53de158abeac638ab8571dd9db9db8e7e5e325646f936f4d2ebf0f2816f32f42be67a320cbf7

        • C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.akira

          Filesize

          561B

          MD5

          29544ccc046bad4e3b0f8249d775a2e4

          SHA1

          81604538a09074d0b5486ab3345a8d581ffdf015

          SHA256

          4df29e5512a095b13bee843adfdda5038786c3612423942d871a638d75e10361

          SHA512

          b86c5d34fa7221002480fa03989dd558f1943342216f6f06c4c437dda3600b615727d0934975be2913b3e7e3bf241058eb7524fa27758e1459e4cb26eeabeff7

        • C:\Program Files\Java\jre7\lib\zi\Etc\GMT.akira

          Filesize

          561B

          MD5

          e935c2c83cc5d6788894512fe23f49b6

          SHA1

          ed7a7d51b26486bac83b1aad02f7d467a92003e3

          SHA256

          58c12edc5ac3f869d8f695bca8e42c18c30b85df8c00034f4a33a920d9826c6a

          SHA512

          874486a62df557c3ddf4069100b36ed824944995ee8ed58f733a0a26dd76beed95794cf88ce68c9e08712df6355e5794f5d01cab16d2f672e5f9c47280a8b9f3

        • C:\Program Files\Java\jre7\lib\zi\HST.akira

          Filesize

          561B

          MD5

          2ffb808e8b6d7664c51e5b27f6a0e467

          SHA1

          c4982241014b5c3e79a37539baee112800571993

          SHA256

          a4471c4bac933fef7ff2b28d3a2dcc3cec2147724969431bf3a7f942d5e0d316

          SHA512

          fffa0c0ba35d148c33fb0782684a8848dca9f91dc9a40cab87e6cebf631d62e6f1ee2397f1629cb0d3cab8d5e030e00994daf6775eca60b0c07bbf50bea1a993

        • C:\Program Files\Java\jre7\lib\zi\MST.akira

          Filesize

          561B

          MD5

          1277f08d556f0e90b438ced0590bb7f4

          SHA1

          91711719c968e9faa6ce785dce0377d78321d97c

          SHA256

          caa43bb3617812af9f6c63ad834f3caed9a5bf1d6139e5f33817a20bb8243ff1

          SHA512

          195adf68773641ac2438f6f48117ed7dc534155093628f1f8de04b1c2574c48c5b571a18aa2ff7bf4b8961cf063b04b8d9c5ee701dd5302003b138e6c1c57250

        • C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\vlc.mo.akira

          Filesize

          665KB

          MD5

          bac642b8e1607d1abd32a31d3c2521bd

          SHA1

          75cc0758825d327daaa3ec85adb93e7f7fc6a0d6

          SHA256

          8bd29d964209b4d3cd9dcce1eace93e0a63fb295b8a76d5cabe58e10a2ce41d7

          SHA512

          c8e40a4db4b0e8712444f213e1fdcd014d0b23d3aea4e16a237b94f92013d94bc7a3fe2c48fa10e875c100491130562377095fa969b15dc8186057a7c75d0090

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT.akira

          Filesize

          550B

          MD5

          f0097295ee3cd87547553b05f6e6bf35

          SHA1

          b3ba054a143f122ea30439528df9ec3764b5c42e

          SHA256

          9c72e89db51be5f4a0878b0ce074ac0868a0f71fbcbd2588c435901ba2705fcd

          SHA512

          5eacbe2a81fa4d2d6004b9dc22d90fa3b65e2937ae74ac92d23fd275ef178cee7fd396cbb8d7f5f7724bb282b4b51431434c6646c0b07f238cf90502af7771ec

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_2.akira

          Filesize

          8KB

          MD5

          c906d1195add92bc31b61c46850914f5

          SHA1

          2624a1e8241e8247e118341ea241fa78ee57a1a2

          SHA256

          32bf84ecccb0ebbcf28a19f041dd6a37f2185a5802330a1aaf584919640c4265

          SHA512

          33b730dfb47daa48c33a264ce91eb39ca89dbad6e59ffb39691a3f7ef7d4cf39188a225479a777de87af9ee43866356db3fe8fd884a319fdfa2be2668e1283b3

        • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BB4W7M7Z\desktop.ini.akira

          Filesize

          601B

          MD5

          2c191cfae80c8bb05590fe7d651c1089

          SHA1

          38e2479cc84ae014cec1c458a22dc80991022aa9

          SHA256

          cd2b05fba060cdff3630cda3b81cc1ed1a31901910427ce99816716cf0e1494a

          SHA512

          356c3c3e4e80835c6a6574760e08dbf4de02d18dc1e94e0f8b3eb6a5c214bd6d599eab21d46f53b05e167d7955e35520e7bf53a94d36b51ac334ff87e85b257e

        • C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Web Slice Gallery~.feed-ms.akira

          Filesize

          28KB

          MD5

          0bc2bdec062e465cb6a80b68a84e7ffb

          SHA1

          5418e66f2c6150c33c44894d4846b8e133f761a0

          SHA256

          3f7b3fab57820f6ca7d088e9e6b21c2846d9164aed8147c575b5a79d418c8831

          SHA512

          6e24d5bac5f9eecf35566995a35e756458b329919272a910dbcb814b467c5315da756a87e1bf7e0f6cee4842a9097292cf6607eb0807e89c1137be17cb08c17c

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira

          Filesize

          48KB

          MD5

          540f171615ba0270a0d980908bfe0219

          SHA1

          95f6901c735a29c1485cf5acbce2ffc6377818d8

          SHA256

          4707a569f7718c611644160111e4965477e43cecb431f21ef895e829a064f142

          SHA512

          256dca0481fba3056980ce6d4efb54eebd0c49b5a4ffc762aa8020e43c506c8f7729dd564a7370b2108d793cb2bcc855d7559509fd06487649f97a0f10cf0854

        • memory/1980-6-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB

        • memory/1980-8-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB

        • memory/1980-10-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB

        • memory/1980-9-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB

        • memory/1980-7-0x0000000002290000-0x0000000002298000-memory.dmp

          Filesize

          32KB

        • memory/1980-4-0x000007FEF5A2E000-0x000007FEF5A2F000-memory.dmp

          Filesize

          4KB

        • memory/1980-5-0x000000001B720000-0x000000001BA02000-memory.dmp

          Filesize

          2.9MB

        • memory/1980-11-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB

        • memory/1980-12-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

          Filesize

          9.6MB