Analysis
-
max time kernel
96s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
win32_locker.ex_.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
win32_locker.ex_.exe
Resource
win10v2004-20240802-en
General
-
Target
win32_locker.ex_.exe
-
Size
879KB
-
MD5
2a7a76cde7e970c06316e3ae4feadbe3
-
SHA1
89d195f59bba9c3b43635607f9f1c3051645332c
-
SHA256
2c7aeac07ce7f03b74952e0e243bd52f2bfa60fadc92dd71a6a1fee2d14cdd77
-
SHA512
834f76c0de678d26507fa1a3446cf6336952d36bd2857113f1bbaddf0d33132d4c579bfd232194868c8dc4ddefa66a9c589610e74f4a808787b8edf36f3d5b4f
-
SSDEEP
24576:dpN2CMwVhLcqnB+c9z2Va31qIU2p1GA3zaIJYj9+M+C6vU1KKoPAFGG+TR3aZX:UC5Uqn4c9z2Vu1qIU2pAA3rM+C6vZJAp
Malware Config
Extracted
C:\Program Files (x86)\Adobe\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 1100 powershell.exe 83 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (9252) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1864 powershell.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.akira win32_locker.ex_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\ct.sym.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ppd.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\LogoBeta.png.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png.akira win32_locker.ex_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-phn.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCombinedFloatieModel.bin.akira win32_locker.ex_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\am.pak.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-phn.xrm-ms.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\it-it\ui-strings.js.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\ui-strings.js.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_KMS_Client-ul.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ppd.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-hover_32.svg.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\A12_Spinner_int_2x.gif.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\excelmui.msi.16.en-us.vreg.dat.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\ui-strings.js.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\libffi.md.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\OriginLetter.Dotx.akira win32_locker.ex_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-ae\ui-strings.js.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\dynalink.md.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\PAPYRUS.TTF.akira win32_locker.ex_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jscripts\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\Common Files\microsoft shared\TextConv\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\MSFT_PackageManagementSource.schema.mfl.akira win32_locker.ex_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ul-oob.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\ui-strings.js.akira win32_locker.ex_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\spectrum_spinner.svg.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-pl.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\s_agreement_filetype.svg.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial-ul-oob.xrm-ms.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\akira_readme.txt win32_locker.ex_.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Frosted Glass.eftx.akira win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-ul-oob.xrm-ms.akira win32_locker.ex_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\System\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\libxslt.md.akira win32_locker.ex_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN065.XML.akira win32_locker.ex_.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\e845489d54f2bc3c9bef64fa18b71322.arika win32_locker.ex_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\akira_readme.txt win32_locker.ex_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BRADHITC.TTF.akira win32_locker.ex_.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Extensions\akira_readme.txt win32_locker.ex_.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32_locker.ex_.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{2D432031-649C-40AC-A9E0-AC5358D42CB4} explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 powershell.exe 1864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1864 powershell.exe Token: SeBackupPrivilege 404 vssvc.exe Token: SeRestorePrivilege 404 vssvc.exe Token: SeAuditPrivilege 404 vssvc.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe Token: SeShutdownPrivilege 380 explorer.exe Token: SeCreatePagefilePrivilege 380 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe 380 explorer.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\win32_locker.ex_.exe"C:\Users\Admin\AppData\Local\Temp\win32_locker.ex_.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5096
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:404
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:380
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e158265e513c5b865b19240370d4cb81
SHA14a37838237b622bc8f6049cf62573d7ed69b1a25
SHA256f13ffbbdf446bb88a48de8162406b9b2f97cde15a27ce007a156f4dbd028fb2a
SHA512dd8e241126d131f4d3d4c3936ccb06eef955258573c7337a241cb93fea66e41324caae2ced4548b9e69c7427f3649d134f670607e0e65a13bdaa61b3381cbb34
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.akira
Filesize623KB
MD562679a0824401418badb34878df1ef84
SHA1200e78e4b19d86ae58152496b4d757065d4e4ebe
SHA256ece54ece7c3e383b1cd755f065f3b5b0bd5722aa60de78a78ae217b3b2969655
SHA51210c5ab5383bf4467a2e337700f383b699e42282fd48a8093b8ab0efe38b727d057521ed138594c25a7825b7704d5ffaa0ac7bf0d9a21a419594b616592d00d12
-
Filesize
3KB
MD5a460f0e6609660cbd67720a6fcd47e97
SHA1dda2829b73ec675a28549140bb9e42b5ca5ed88c
SHA256388c4294a34b28feda6077ff2ea51bed2fe683fcd2fe6b786836095e254e02a3
SHA5126090bfa23fd0b5157b0eef84978407d282bcb3d66164e3279aa42172156a07f6a0081f4ae2c2d5c959b020a33175164de8a8da0aef90b8c37f6718df56f62ca4
-
Filesize
576B
MD57b0657d55c8cd659652fef8a8d562612
SHA139ebe01a172f8f51c0a8f17331211f7b0d32a600
SHA256bca98307c3d90934f8cf5673866fdb465a62fce40d5891ff6e17e50c43de233f
SHA512f5064741aa615657c114ae2726dfca4572a28f6a5f708f8e13dc6b6d94972428dc0051c9fe76b0556750b59d326449c6f0a53da4fb6e688ebb8105807527a2db
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82