Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
win.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
win.exe
Resource
win10v2004-20240709-en
General
-
Target
win.exe
-
Size
1005KB
-
MD5
773fcd0432808e74bfb863489799dd05
-
SHA1
c8008c0d50ddf9757c2e11b11d94dae0c5307915
-
SHA256
2bfe3fba2e94b1a4f8ae0ea767b64084390155bb4d57cc39e13c15b181f8d377
-
SHA512
7714265c16c7bfd5786eb423583a3ab8f71daec5d6ace00d7613522aaa26b8fcea28c63bc294e99a84e8131896d6ca425abde4c354b2d78059fb5075b42adb45
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmhE:wbyxv9XQ7B3oWI+XHW6y48
Malware Config
Extracted
C:\PerfLogs\Admin\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2152 powershell.exe -
Renames multiple (9053) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
-
Drops startup file 1 IoCs
Processes:
win.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt win.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
Processes:
win.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini win.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini win.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini win.exe File opened for modification C:\Users\Admin\Searches\desktop.ini win.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini win.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini win.exe File opened for modification C:\Users\Public\Desktop\desktop.ini win.exe File opened for modification C:\Users\Public\Libraries\desktop.ini win.exe File opened for modification C:\Users\Public\Videos\desktop.ini win.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CGY9ZAGI\desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\OORJZY5Z\desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini win.exe File opened for modification C:\Users\Public\Music\desktop.ini win.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini win.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini win.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UGUBWRQR\desktop.ini win.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini win.exe File opened for modification C:\Users\Admin\Links\desktop.ini win.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini win.exe File opened for modification C:\Users\Public\Documents\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini win.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini win.exe File opened for modification C:\Users\Public\Pictures\desktop.ini win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI win.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini win.exe File opened for modification C:\Users\Admin\Videos\desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\TWVGEE8A\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini win.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini win.exe File opened for modification C:\Users\Admin\Documents\desktop.ini win.exe File opened for modification C:\Users\Admin\Music\desktop.ini win.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini win.exe File opened for modification C:\Program Files\desktop.ini win.exe File opened for modification C:\Users\Public\Downloads\desktop.ini win.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini win.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini win.exe File opened for modification C:\Users\Public\desktop.ini win.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini win.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini win.exe File opened for modification C:\Program Files (x86)\desktop.ini win.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
Processes:
win.exedescription ioc process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_rest.png win.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaTypewriterRegular.ttf win.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\gadget.xml win.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\akira_readme.txt win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-loaders_ja.jar win.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\splash.gif win.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\weather.js win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Person.gif win.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Rome win.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask.wmv win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02950_.WMF win.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\akira_readme.txt win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00289_.WMF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\RTF_BOLD.GIF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCARD.DPV win.exe File created C:\Program Files\VideoLAN\VLC\lua\akira_readme.txt win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.war win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00246_.WMF win.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\button_left.gif win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\LICENSE win.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\settings.css win.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\akira_readme.txt win.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_down.png win.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground.wmv win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107708.WMF win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18219_.WMF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21512_.GIF win.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\akira_readme.txt win.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\akira_readme.txt win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10336_.GIF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14868_.GIF win.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\STSLISTI.DLL win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ODBCR.SAM win.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api win.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\akira_readme.txt win.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png win.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\akira_readme.txt win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGZIP.DPV win.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\weather.css win.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\akira_readme.txt win.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\OSETUPUI.DLL win.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\akira_readme.txt win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKACCS.ICO win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\TAB_ON.GIF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7ES.LEX win.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00158_.GIF win.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\akira_readme.txt win.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\WhiteDot.png win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert_5.5.0.165303.jar win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02125_.WMF win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18197_.WMF win.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\divider-horizontal.png win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS_F_COL.HXK win.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\Minesweeper.exe.mui win.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\akira_readme.txt win.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\akira_readme.txt win.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tongatapu win.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\vlc.mo win.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297757.WMF win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
win.exepowershell.exepid process 2084 win.exe 2084 win.exe 2128 powershell.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe 2084 win.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 2128 powershell.exe Token: SeBackupPrivilege 2672 vssvc.exe Token: SeRestorePrivilege 2672 vssvc.exe Token: SeAuditPrivilege 2672 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a88c166459b4ea3be8cd01ceb6154444
SHA1c7784fea209117fab94b1c6d6ac032ad52beb1d6
SHA25661c11e3aba48570c779457d1833c2c7c2a50048f80af59a81c1b9668ba32c13d
SHA512c71e39364c909549a51fd1c48bc2adae9ee1573d0c37d3b89870b10e51e6a646e12fde5d290d9d700fb28b98652e48bb5aa72adee2b246e5142a169a182bbd0c