Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
Resource
win10v2004-20241007-en
General
-
Target
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe
-
Size
1.0MB
-
MD5
5eadd67bec799465fa27a17d6bf93e2d
-
SHA1
aa5bf7a9520cfdd620b4ba98064aa5e2f2f45521
-
SHA256
d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90
-
SHA512
cbbf7cf190e81ef30cfc0e352bf8fe2050c5771dc5259f633dd45e968fa4b529cb5158a4115a07c6b95de9da0e53f9430044b8b912ddb6e6cab2c2c28035cb06
-
SSDEEP
12288:Vpp+QIEmDzuImC01vbUE98pik+2i1NkshdMMK+AX99etq2dTd5f:Vpp+Q+u5bUI8pij1NkshdMf99etb5D
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/si
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 3136 powershell.exe 83 -
Renames multiple (8446) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1672 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Music\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Documents\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Videos\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Music\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Desktop\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Links\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Downloads\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Users\Public\Libraries\desktop.ini d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ppd.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Dismiss.scale-80.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-24.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\landing_page_start_a_coversation_v3.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Microsoft.Xbox.SmartGlass.Controls.winmd d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy.jar d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\ui-strings.js d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\ja-JP\msader15.dll.mui d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\autofill_labeling_features_email.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\Timer3Sec.targetsize-64.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_altform-unplated_contrast-black.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\SmallTile.scale-200.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Grace-ul-oob.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\MSTAG.TLB d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\THMBNAIL.PNG d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ml-IN\View3d\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\2876_20x20x32.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\AppxMetadata\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-30_altform-unplated_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\PaySquare44x44Logo.targetsize-24_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-72_altform-lightunplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-100.HCBlack.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-80_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\LightTheme.acrotheme d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_cancel_18.svg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ul-oob.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-125_contrast-black.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-40_altform-unplated_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-96_altform-unplated_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextDark.scale-200.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-80_altform-unplated.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\Yelp9.scale-200.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RTC.der d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sk-sk\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\example_icons2x.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookMedTile.scale-150.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-60_contrast-black.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\VBAJET32.DLL d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\TestDrive.Tests.ps1 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-pl.xrm-ms d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\de-de\AppStore_icon.svg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Resources\1033\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOARIANEXT.DLL d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailMediumTile.scale-200.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\GlassPixelShader.cso d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\LargeTile.scale-100.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\Content.DATA d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-16_contrast-white.png d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\canvas_light.jpg d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\akira_readme.txt d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 1672 powershell.exe 1672 powershell.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe 3084 d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1672 powershell.exe Token: SeBackupPrivilege 1232 vssvc.exe Token: SeRestorePrivilege 1232 vssvc.exe Token: SeAuditPrivilege 1232 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe"C:\Users\Admin\AppData\Local\Temp\d07b379369e9faea0fed406b9b37652b2fc6453044ab17c1e2189cf61640ab90.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c09c43e24a17fc73616add9c00f3f0fa
SHA12045ed30f2757081201f06f87e442a0227beca40
SHA2566d583ae416eaa1b65b0c9c433852f6edfacba96e39c85a005ca6d5828d4e70f0
SHA512be9312440d658dfe7dc97ddb0e77f24f3e1028a6f6f96b6f7e73275b0ad06abb0bd1729506d11c47102fed482c75fe3d8202002ea0250c6126d14deb24c717de
-
Filesize
3KB
MD561eb1fc038f1e5a84348523d0c7c3d5d
SHA13efc9a502d38c5a95a678b124716a01fd0eeb0fc
SHA256c76aa3e56645039b4166b49025bc3d3f8c8de01a6f4a792414d44baafbca2614
SHA5124b16be971a0ce1dba9e01c5b109864df258e5fd45580a4fdcf4e099476866715254fd7baaf7a3871b5eb85fb0f466c910414aeffce9d01dafe2c741530769da0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82