Analysis
-
max time kernel
96s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
Resource
win10v2004-20241007-en
General
-
Target
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
-
Size
1.0MB
-
MD5
5eadd67bec799465fa27a17d6bf93e2d
-
SHA1
aa5bf7a9520cfdd620b4ba98064aa5e2f2f45521
-
SHA256
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90
-
SHA512
cbbf7cf190e81ef30cfc0e352bf8fe2050c5771dc5259f633dd45e968fa4b529cb5158a4115a07c6b95de9da0e53f9430044b8b912ddb6e6cab2c2c28035cb06
-
SSDEEP
12288:Vpp+QIEmDzuImC01vbUE98pik+2i1NkshdMMK+AX99etq2dTd5f:Vpp+Q+u5bUI8pij1NkshdMf99etb5D
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/si
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 3700 powershell.exe 83 -
Renames multiple (8391) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 3564 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Links\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Music\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Documents\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Videos\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Desktop\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Downloads\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Libraries\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\THMBNAIL.PNG d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSmallTile.scale-125_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.targetsize-32_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_sent.gif d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBOB6.CHM d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\sr-latn-cs\mso.acl d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailMediumTile.scale-200.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarMediumTile.scale-400.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons_retina.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\OMICAUTINTL.DLL d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\MSFT_PackageManagement.strings.psd1 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Reference Assemblies\Microsoft\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-36_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-30_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_reader_logo.svg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Grace-ul-oob.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\mpvis.dll.mui d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-125.HCWhite.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20_altform-lightunplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-si\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TimerSmallTile.contrast-white_scale-125.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\AppxSignature.p7x d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\index.windows.bundle.meta d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black_devicefamily-colorfulunplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ko-kr\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Microsoft Office\root\Office16\dd0bcc0d47e52a03b237ea6b549d5d57.arika d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_DogNose.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\PeopleWideTile.scale-125.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookWideTile.scale-400.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-40_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_agreement_filetype.svg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\it-it\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\DRUMROLL.WAV d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\PREVIEW.GIF d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-150.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\LightTheme.acrotheme d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ppd.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nl-nl\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-100.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MedTile.scale-100_contrast-black.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailMediumTile.scale-125.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\msinfo32.exe.mui d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-ppd.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL081.XML d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\config.xml d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\7.jpg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-125_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_Full.aapp d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-ppd.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\PICTIM32.FLT d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\it-it\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\mso0127.acl d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ppd.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3564 powershell.exe 3564 powershell.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3292 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3564 powershell.exe Token: SeBackupPrivilege 4520 vssvc.exe Token: SeRestorePrivilege 4520 vssvc.exe Token: SeAuditPrivilege 4520 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe"C:\Users\Admin\AppData\Local\Temp\d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c09c43e24a17fc73616add9c00f3f0fa
SHA12045ed30f2757081201f06f87e442a0227beca40
SHA2566d583ae416eaa1b65b0c9c433852f6edfacba96e39c85a005ca6d5828d4e70f0
SHA512be9312440d658dfe7dc97ddb0e77f24f3e1028a6f6f96b6f7e73275b0ad06abb0bd1729506d11c47102fed482c75fe3d8202002ea0250c6126d14deb24c717de
-
Filesize
3KB
MD504edeee9549ae90016aaa9d61b64eac6
SHA1ef51305dd553af22a2841a8ed1ae3675a0398d3c
SHA256b6625b8b82b80bf5e8adfabba7fb4e02a59b3720259dd8c5a60e1c66d93b46e2
SHA512e91a6db065852781bb78c28ed61b757e986ada8a789549246bb72dd7205d973b362ed0cd7d0f6e644d5e03da712e306300932fb1478280107e35997144c005bb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82