Analysis
-
max time kernel
95s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe
Resource
win10v2004-20241007-en
General
-
Target
e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe
-
Size
1.0MB
-
MD5
7486f1a88d6a3ae96fa08f882d452399
-
SHA1
1972310a91ee9fbf7ba705614a8007df4c858b23
-
SHA256
e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8
-
SHA512
53ff34d58951e79d1f4a08558c848f8f88b2acf0508a36e282f4c7ff37e0d62be7d578b472b678822b019228301a3d41a4d2146044a4583d91ed15539fc02645
-
SSDEEP
12288:Vpp+QIEmDzuImC01vbUE98pik+2i1NkshdMMK+AX99etq2dTdPf:Vpp+Q+u5bUI8pij1NkshdMf99etb5d
Malware Config
Extracted
C:\Program Files\7-Zip\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/5980110617-HVXPJ
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 3704 powershell.exe 82 -
Renames multiple (8449) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1640 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Music\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Desktop\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Downloads\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Libraries\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Documents\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Music\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Documents\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Links\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Videos\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Pictures\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Searches\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\Videos\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Users\Public\desktop.ini e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.targetsize-24_altform-unplated_contrast-black.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.tlb e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\LargeTile.scale-125.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.scale-400.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-256.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\Xbox360PurchaseControl.xaml e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderStoreLogo.contrast-white_scale-100.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_scan_logo.svg e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-ppd.xrm-ms e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\VALoading.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.Telemetry\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-ae\ui-strings.js e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-30_contrast-white.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\NavigationIcons\nav_icons_messages.targetsize-48.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL083.XML e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_ES.LEX e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\file_info2x.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\iexplore.exe.mui e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Windows NT\Accessories\fr-FR\wordpad.exe.mui e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyView.scale-200.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\cloud_secured_lg.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-20_altform-unplated.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\GlobalMock-A.Tests.ps1 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluEmptyFolder_160.svg e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\am.pak e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-125.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\ENUtxt.pdf e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\Windows Defender\uk-UA\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\Microsoft Office\root\Templates\Presentation Designs\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kk-KZ\View3d\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\logo.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\en-us\office_strings.js e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeBadge.scale-200.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\classlist e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\ui-strings.js e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Fonts\SkypeAssets-Bold.ttf e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeLogo.scale-200.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-64_altform-lightunplated.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ro-ro\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\eu-es\ui-strings.js e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\VideoLAN\VLC\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeAppList.scale-125_contrast-black.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.targetsize-48_altform-unplated_devicefamily-colorfulunplated.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-24_altform-lightunplated.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsWideTile.scale-100.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.scale-80.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\Undo.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\akira_readme.txt e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-200.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageWideTile.scale-200_contrast-black.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsMedTile.contrast-black_scale-200.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\vlc.mo e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\RotateVerticallyOverlay.png e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\MSFT_PackageManagement.strings.psd1 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1640 powershell.exe 1640 powershell.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe 1600 e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1640 powershell.exe Token: SeBackupPrivilege 1080 vssvc.exe Token: SeRestorePrivilege 1080 vssvc.exe Token: SeAuditPrivilege 1080 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe"C:\Users\Admin\AppData\Local\Temp\e10cae894e8873c72ae9e5f3590e2f78f6cc2dcfe01e1a5039c8b6532bfab5f8.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ac0d45ddc2f8f0129e86bc85532b9171
SHA1d2d545255c6c7523aa846bbd5e88506aa836d5d7
SHA25645da399c7e36b1532108d42fe894f4bc0990671764606edfb8ffd7b5e9618979
SHA51264948d3bd66a936f605ba355610bd806a1e60feed7720def006431786ff01a1278626869601cb3e650f6dc5f5a146717cb894b40f3ae38300b1ea20c3b672613
-
Filesize
3KB
MD530e0b4ec8766c88066de47bb23a76d9b
SHA19924cfdada3460a336befaf1927795b4f621f60e
SHA2561aaf80ba4d6177b6adb0eb7d1a9dc28f2918bbe31c39768f2baf0fabccb7f647
SHA512a389475d600f02fa426867e37b13f20b94da77f998a94a8debf3096868f7c917d14e86abe5035fab7321535f24b469f80487a3c63737cda676df3400985c3e14
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82