Resubmissions
05-09-2024 01:35
240905-bz2w9s1hle 1005-09-2024 01:35
240905-bzmsca1hkb 1005-09-2024 01:17
240905-bns5zszeqm 10Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe
Resource
win11-20240802-en
General
-
Target
988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe
-
Size
1.0MB
-
MD5
4aecef9ddc8d07b82a6902b27f051f34
-
SHA1
8ad1b4ed98794e8f0a9a9d6fc161697974099d91
-
SHA256
988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42
-
SHA512
605fb600668cbadb0f556589f923209def1cd3c51b123f4ce7a5325722bcca05f6bb3b26bf7a6aa52bffabe6129c508b302e85ee0a120bedd96a71a105eae437
-
SSDEEP
12288:Vpp+QIEmDzuImC01vbUE98pik+2i1NkshdMMK+AX99etq2dTdYf:Vpp+Q+u5bUI8pij1NkshdMf99etb5m
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 2096 powershell.exe 78 -
Renames multiple (8853) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1700 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 30 IoCs
description ioc Process File opened for modification C:\Users\Admin\OneDrive\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Videos\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Links\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Music\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Music\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Documents\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Users\Public\desktop.ini 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\ui-strings.js 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\OperationValidationResources.psd1 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\root\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\c08378192f493495df082eb18238feb1.arika 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\ResiliencyLinks\Locales\as.pak.DATA 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\Theme_Illustration_Seasons_Winter_Thumbnail.jpg 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense_eula.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\ResiliencyLinks\Trust Protection Lists\Mu\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PaintStoreLogo.scale-400.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxCalendarLogoExtensions.scale-48.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-400_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\PeopleAppList.targetsize-40.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial2-ul-oob.xrm-ms 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Grace-ppd.xrm-ms 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\BeLikeExactly.Tests.ps1 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\WeatherAppList.targetsize-60_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxMailWideTile.scale-150.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-32_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\bg1a.jpg 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ul-oob.xrm-ms 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\ui-strings.js 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\THMBNAIL.PNG 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-60_contrast-black.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-40_altform-unplated_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-125_contrast-black.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\ui-strings.js 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_en_135x40.svg 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-100.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\7d933e87c975dbc0c5798e1aaf2e6c61.arika 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ul-oob.xrm-ms 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\VBEUI.DLL 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintAppList.targetsize-36_altform-unplated.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-80_altform-unplated.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxA-Google.scale-250.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\contrast-white\FeedbackHubAppList.targetsize-96_altform-unplated.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@uifabric\utilities\lib-commonjs\dom\getVirtualParent.js 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ko-kr\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\Locales\mi.pak 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmuxmui.msi.16.en-us.tree.dat 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\contrast-white\GetHelpAppList.targetsize-40_altform-unplated_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\ko-KR\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\contrast-white\PowerAutomateSplashScreen.scale-100.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\FetchingMail-Dark.scale-100.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\tzdb.dat 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019MSDNR_Retail-ppd.xrm-ms 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Google\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\90.0.818.66\ResiliencyLinks\MLModels\autofill_labeling_features_email.txt.DATA 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.targetsize-32_contrast-white.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_contrast-black.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Lumia.AppTk.NativeDirect3d.UAP\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-60_altform-unplated_contrast-black.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.NETCore.App.runtimeconfig.json 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File created C:\Program Files (x86)\Internet Explorer\en-US\akira_readme.txt 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\contrast-black\NotepadAppList.targetsize-64_altform-unplated.png 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\lib-amd\colors\index.js 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1700 powershell.exe 1700 powershell.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe 1900 988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1700 powershell.exe Token: SeBackupPrivilege 4332 vssvc.exe Token: SeRestorePrivilege 4332 vssvc.exe Token: SeAuditPrivilege 4332 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe"C:\Users\Admin\AppData\Local\Temp\988776358d0e45a4907dc1f4906a916f1b3595a31fa44d8e04e563a32557eb42.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e158265e513c5b865b19240370d4cb81
SHA14a37838237b622bc8f6049cf62573d7ed69b1a25
SHA256f13ffbbdf446bb88a48de8162406b9b2f97cde15a27ce007a156f4dbd028fb2a
SHA512dd8e241126d131f4d3d4c3936ccb06eef955258573c7337a241cb93fea66e41324caae2ced4548b9e69c7427f3649d134f670607e0e65a13bdaa61b3381cbb34
-
Filesize
3KB
MD5a181cbcefdad7c4452e2e58227139770
SHA19d371df4aec65ccc0212077f845dc65453daa66e
SHA25603f304a438ef2be298e2731d5e360f6e83318ab7462fb172fd0f2a2d09adbbde
SHA512fad34655c6a8c59c825dce16c1f266e4f1731b65b9bad3f3c5cce96513b987b25c5069da97e845a981b583a30f734053ace66d32bdebbee7914992ab2033aeae
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82