Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 16:58

General

  • Target

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe

  • Size

    573KB

  • MD5

    503f112e243519a1b9e0344499561908

  • SHA1

    8d635ca131d8aa20971744dcb30a9e2e1f8cd1be

  • SHA256

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc

  • SHA512

    71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e

  • SSDEEP

    12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos

Malware Config

Extracted

Path

C:\MSOCache\All Users\akira_readme.txt

Family

akira

Ransom Note
Hi friends, Whatever who you are and what your title is if you're reading this it means the internal infrastructure of your company is fully or partially dead, all your backups - virtual, physical - everything that we managed to reach - are completely removed. Moreover, we have taken a great amount of your corporate data prior to encryption. Well, for now let's keep all the tears and resentment to ourselves and try to build a constructive dialogue. We're fully aware of what damage we caused by locking your internal sources. At the moment, you have to know: 1. Dealing with us you will save A LOT due to we are not interested in ruining your financially. We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you. If you have an active cyber insurance, let us know and we will guide you how to properly use it. Also, dragging out the negotiation process will lead to failing of a deal. 2. Paying us you save your TIME, MONEY, EFFORTS and be back on track within 24 hours approximately. Our decryptor works properly on any files or systems, so you will be able to check it by requesting a test decryption service from the beginning of our conversation. If you decide to recover on your own, keep in mind that you can permanently lose access to some files or accidently corrupt them - in this case we won't be able to help. 3. The security report or the exclusive first-hand information that you will receive upon reaching an agreement is of a great value, since NO full audit of your network will show you the vulnerabilities that we've managed to detect and used in order to get into, identify backup solutions and upload your data. 4. As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog - https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion. 5. We're more than negotiable and will definitely find the way to settle this quickly and reach an agreement which will satisfy both of us. If you're indeed interested in our assistance and the services we provide you can reach out to us following simple instructions: 1. Install TOR Browser to get access to our chat room - https://www.torproject.org/download/. 2. Paste this link - https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion. 3. Use this code - 8207-KO-BXVB-HKJB - to log into our chat. Keep in mind that the faster you will get in touch, the less damage we cause.
URLs

https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion

https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion

Signatures

  • Akira

    Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (8623) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell command to delete shadowcopy.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 47 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2856
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
    1⤵
    • Process spawned unexpected child process
    • Command and Scripting Interpreter: PowerShell
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1980
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\akira_readme.txt

    Filesize

    2KB

    MD5

    de49e2e3eeb866fc517949893ed74bed

    SHA1

    3b503e6776a34f026f77ba7fea719dec182575e6

    SHA256

    994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e

    SHA512

    f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8

  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira

    Filesize

    28KB

    MD5

    1b7500451276c1864470ac1cca0bc22d

    SHA1

    0edbea950d2d45c10f31d76655fd680e9340cdd5

    SHA256

    3f66f8fdc1298495b71c0495ba9892984d728d01c61f3481e049f9c885ee3f8b

    SHA512

    717b1ce80edfbf46a5d72a1bb884cf8d671f8114158b146ff48d0994ea65c1508c4d42716b36a2a36b1fffaa0520572afc2b1ea6b6c4a333f85bedc26ac82c2f

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira

    Filesize

    875B

    MD5

    e9c31cf8f3bc0b5220b86e89ea9467bc

    SHA1

    8fe4c24851712a6102a6bf1b5f8e8e30611967c6

    SHA256

    495c5e50ae939e924234717a97c1c0831ac759e276a15448db1e1448c73d5407

    SHA512

    59db1c0dd2e23a0c14e2bf57fd89e5d226f0efb1434eaa526e9d5d1145360baea3d08ef558ed5419a78256db077ef5c4f07be82370a1df48ab431c1fd1c68925

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira

    Filesize

    756B

    MD5

    1e29c791793adff806e590eec8825237

    SHA1

    de0a22213f53af914f584c3d5461a0d49601d9fb

    SHA256

    a0a4915c05778c59a5deff93f8c5390dc7a4ab05720835210a4c9d30cd7020db

    SHA512

    2c97b620d5df913330f6d13f0de4183f83819fe22598d7621719830278661564c5e91d4e7421abc08fb7a6b0a019f5e0dddcc6226dc09d32919c5195c09c9a2c

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.akira

    Filesize

    648B

    MD5

    9069ebb2bba73570cc67348887182343

    SHA1

    7cd0bce978629764870c4f04c0d19ca557ac1500

    SHA256

    28ef7c8518cda39f3da615827a55b5467d4a508b99d36662ad15fc1f17c2083c

    SHA512

    01a484cf65dda61e4de713572406dcd00a53a052520fa6301980a7f95742a41268b579a606c659e40deacf59d72873ad76a40311b5094dba57559c17d2ddb03b

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.akira

    Filesize

    647B

    MD5

    d6b03d9ce4f59f79eb9579a14b7ed7ec

    SHA1

    2a20ba5fe5c9d180330c3e20204d85ca9d407796

    SHA256

    1515bb2850f2b297b87efd2e8f3080f93de6d3431e013b2dfb4f66de647d4655

    SHA512

    cd974697eeb121d4e93f7e3564211cd10b151c59600c2f54751a0266e8f25f066d3a8ec721f1bdc578c7b1d9e71c0cfd932dbe795049762f293d24d607fd74bc

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\BUTTON.GIF.akira

    Filesize

    719B

    MD5

    9f6847327b3bf83289de7c1826a0b1ed

    SHA1

    5e7ff79afe9ac1d1f7fffe4620fdc96e01deca2e

    SHA256

    1b1123a4f5a2cc1cf2074089cd14f45e3f5d306aea1ea5878acb3e274ab7f47a

    SHA512

    a2fb371df392778ae20a154d2cc62e6f08985f97c6974533ce5f2f4f9bd0a0f8e5abdfe3fce02918fc7369ec4a64c0ed30bd57ad0199b80100e362fb8f1c50e4

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira

    Filesize

    1KB

    MD5

    126edaa6967e73e06849ad4f3a66c328

    SHA1

    23caed6dcc46cedd513394de39e233fbb808cb1a

    SHA256

    e0ef7948c8274e659ea1a34bfd7c1a64fcedda0843d175187fe196cea1ed9aeb

    SHA512

    f0ac877c3a3908a6ce58459a767fca10ce85513ffad9d388e36c913e3adea147363178145bdab49e84f02b47aa6fbc4fb300db90b764ecc9987d2a4a98c4b165

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira

    Filesize

    1KB

    MD5

    ca4a86213d9703d1e3d03c0485968d81

    SHA1

    4ce5676886576ab9dcb2abea0a335367618da7de

    SHA256

    eb5d394cfb6b0475e7910ec17a500892fa6ef1373dda14dbedce1701472739cc

    SHA512

    134ccb04f096cc99c50d25c682315cbb247573ad7f7359fb3e36b51fb171ed4121974c7fdd654ce8c095f36793f8fe4c27932934db506b71a4b4fcfecb7d6b5d

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.akira

    Filesize

    1KB

    MD5

    2faa51c30ab62f5b8cb72a954dddb8b6

    SHA1

    3462f2c7f2b11bce00a93406fffcddacecf5e9da

    SHA256

    022e61a079c03f0b6bcdb6c2302a2e84f5913524d228fe4b215492fc9dd73aae

    SHA512

    56dbe27ed719f9a664354dc1aac3b08ffe1b0c77527a8191c23223746c25d16f0ee1b5b5defd4f503d01ad0ea8e4d0f8272e67d86286bab0a57b269af232a17e

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf.akira

    Filesize

    591B

    MD5

    f3d0d788a049f643e9a8e95212807f13

    SHA1

    6154dd1c67247873c2d8645cc256f403dd7417fc

    SHA256

    845e89041b911cafce064f55932cb38ca3ee730953bef33948bded450e3c05cd

    SHA512

    3c0119460c983ba2e9826627d4f8d2b9c5c9e3cf9a6d4c9c007a8da13d64d4eb8436fdecad054ca076507e8c90847510b9b1cfd7dd6eb5ee8c831727ef360fc6

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira

    Filesize

    12KB

    MD5

    5d4c6eb521aa62ae4d1393f7081c100c

    SHA1

    b18bd7d9433febde19d627c00cc7b85108ae45a3

    SHA256

    38be1eb7df357a928d94ae548d360779e3fac35029fa414fa7a85d47ad2c07ab

    SHA512

    abca9a1ad5e7f9e45a9b1ac7dff2b1983da5eaa0e436044908c76a452cf97a11af6fe88fef08c0e5724fdb8bf64a0ae906913274a1a847aa9942f1816abbfe09

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.akira

    Filesize

    9KB

    MD5

    297d18f2bab8f0ac047ce6dcbfa23694

    SHA1

    6fd09e04ab7591c1d10bcfa863b17876039f2704

    SHA256

    3218f6ffdfe8d00aa491f75b97cfa8a72481efb6e466c3c1dfead5812abba8b7

    SHA512

    4c8dd64979e17d34242e1a772e0f0d681ae6dfc363dd3494cad3396571212680258c9b936eaa4f2a693e095a3a18b694da4010f5cb8b68f4cf7144e725fbaa93

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira

    Filesize

    8KB

    MD5

    d02df45fd88a16d994e261415609f468

    SHA1

    5868cf2e46294fbf84f1f6ce7f3ff64c811dbe0e

    SHA256

    ffa0c751e5d101f9e7b1710e5ae7ffed32d25e0fd17aa019b5975bd93407e945

    SHA512

    ccd6c4bce3d05490af6828d362a3677eadc2749582336ad1ca10be84d88f4588a3a7a51705d802609ba9f437a0680a2eb3bb5677a3965257af3e49b7e3038243

  • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.akira

    Filesize

    687B

    MD5

    79fae8a583b56bca89b7a7a905562209

    SHA1

    14e51c61bfa505e9f8ae0bf9c0e8778be4912c40

    SHA256

    c01d730c8c8cbc818334420b82ecf6751de0658164cd664cf8eac96a5f35dd74

    SHA512

    a05e03e3f982d9eeadc156c673f58c18b542860e19e26622113b53de158abeac638ab8571dd9db9db8e7e5e325646f936f4d2ebf0f2816f32f42be67a320cbf7

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.akira

    Filesize

    561B

    MD5

    29544ccc046bad4e3b0f8249d775a2e4

    SHA1

    81604538a09074d0b5486ab3345a8d581ffdf015

    SHA256

    4df29e5512a095b13bee843adfdda5038786c3612423942d871a638d75e10361

    SHA512

    b86c5d34fa7221002480fa03989dd558f1943342216f6f06c4c437dda3600b615727d0934975be2913b3e7e3bf241058eb7524fa27758e1459e4cb26eeabeff7

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT.akira

    Filesize

    561B

    MD5

    e935c2c83cc5d6788894512fe23f49b6

    SHA1

    ed7a7d51b26486bac83b1aad02f7d467a92003e3

    SHA256

    58c12edc5ac3f869d8f695bca8e42c18c30b85df8c00034f4a33a920d9826c6a

    SHA512

    874486a62df557c3ddf4069100b36ed824944995ee8ed58f733a0a26dd76beed95794cf88ce68c9e08712df6355e5794f5d01cab16d2f672e5f9c47280a8b9f3

  • C:\Program Files\Java\jre7\lib\zi\HST.akira

    Filesize

    561B

    MD5

    2ffb808e8b6d7664c51e5b27f6a0e467

    SHA1

    c4982241014b5c3e79a37539baee112800571993

    SHA256

    a4471c4bac933fef7ff2b28d3a2dcc3cec2147724969431bf3a7f942d5e0d316

    SHA512

    fffa0c0ba35d148c33fb0782684a8848dca9f91dc9a40cab87e6cebf631d62e6f1ee2397f1629cb0d3cab8d5e030e00994daf6775eca60b0c07bbf50bea1a993

  • C:\Program Files\Java\jre7\lib\zi\MST.akira

    Filesize

    561B

    MD5

    1277f08d556f0e90b438ced0590bb7f4

    SHA1

    91711719c968e9faa6ce785dce0377d78321d97c

    SHA256

    caa43bb3617812af9f6c63ad834f3caed9a5bf1d6139e5f33817a20bb8243ff1

    SHA512

    195adf68773641ac2438f6f48117ed7dc534155093628f1f8de04b1c2574c48c5b571a18aa2ff7bf4b8961cf063b04b8d9c5ee701dd5302003b138e6c1c57250

  • C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\vlc.mo.akira

    Filesize

    665KB

    MD5

    bac642b8e1607d1abd32a31d3c2521bd

    SHA1

    75cc0758825d327daaa3ec85adb93e7f7fc6a0d6

    SHA256

    8bd29d964209b4d3cd9dcce1eace93e0a63fb295b8a76d5cabe58e10a2ce41d7

    SHA512

    c8e40a4db4b0e8712444f213e1fdcd014d0b23d3aea4e16a237b94f92013d94bc7a3fe2c48fa10e875c100491130562377095fa969b15dc8186057a7c75d0090

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT.akira

    Filesize

    550B

    MD5

    f0097295ee3cd87547553b05f6e6bf35

    SHA1

    b3ba054a143f122ea30439528df9ec3764b5c42e

    SHA256

    9c72e89db51be5f4a0878b0ce074ac0868a0f71fbcbd2588c435901ba2705fcd

    SHA512

    5eacbe2a81fa4d2d6004b9dc22d90fa3b65e2937ae74ac92d23fd275ef178cee7fd396cbb8d7f5f7724bb282b4b51431434c6646c0b07f238cf90502af7771ec

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_2.akira

    Filesize

    8KB

    MD5

    c906d1195add92bc31b61c46850914f5

    SHA1

    2624a1e8241e8247e118341ea241fa78ee57a1a2

    SHA256

    32bf84ecccb0ebbcf28a19f041dd6a37f2185a5802330a1aaf584919640c4265

    SHA512

    33b730dfb47daa48c33a264ce91eb39ca89dbad6e59ffb39691a3f7ef7d4cf39188a225479a777de87af9ee43866356db3fe8fd884a319fdfa2be2668e1283b3

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BB4W7M7Z\desktop.ini.akira

    Filesize

    601B

    MD5

    2c191cfae80c8bb05590fe7d651c1089

    SHA1

    38e2479cc84ae014cec1c458a22dc80991022aa9

    SHA256

    cd2b05fba060cdff3630cda3b81cc1ed1a31901910427ce99816716cf0e1494a

    SHA512

    356c3c3e4e80835c6a6574760e08dbf4de02d18dc1e94e0f8b3eb6a5c214bd6d599eab21d46f53b05e167d7955e35520e7bf53a94d36b51ac334ff87e85b257e

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Web Slice Gallery~.feed-ms.akira

    Filesize

    28KB

    MD5

    0bc2bdec062e465cb6a80b68a84e7ffb

    SHA1

    5418e66f2c6150c33c44894d4846b8e133f761a0

    SHA256

    3f7b3fab57820f6ca7d088e9e6b21c2846d9164aed8147c575b5a79d418c8831

    SHA512

    6e24d5bac5f9eecf35566995a35e756458b329919272a910dbcb814b467c5315da756a87e1bf7e0f6cee4842a9097292cf6607eb0807e89c1137be17cb08c17c

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira

    Filesize

    48KB

    MD5

    540f171615ba0270a0d980908bfe0219

    SHA1

    95f6901c735a29c1485cf5acbce2ffc6377818d8

    SHA256

    4707a569f7718c611644160111e4965477e43cecb431f21ef895e829a064f142

    SHA512

    256dca0481fba3056980ce6d4efb54eebd0c49b5a4ffc762aa8020e43c506c8f7729dd564a7370b2108d793cb2bcc855d7559509fd06487649f97a0f10cf0854

  • memory/1980-6-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB

  • memory/1980-8-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB

  • memory/1980-10-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB

  • memory/1980-9-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB

  • memory/1980-7-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB

  • memory/1980-4-0x000007FEF5A2E000-0x000007FEF5A2F000-memory.dmp

    Filesize

    4KB

  • memory/1980-5-0x000000001B720000-0x000000001BA02000-memory.dmp

    Filesize

    2.9MB

  • memory/1980-11-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB

  • memory/1980-12-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

    Filesize

    9.6MB