Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 21:39

General

  • Target

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe

  • Size

    573KB

  • MD5

    503f112e243519a1b9e0344499561908

  • SHA1

    8d635ca131d8aa20971744dcb30a9e2e1f8cd1be

  • SHA256

    1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc

  • SHA512

    71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e

  • SSDEEP

    12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos

Malware Config

Extracted

Path

C:\MSOCache\All Users\akira_readme.txt

Family

akira

Ransom Note
Hi friends, Whatever who you are and what your title is if you're reading this it means the internal infrastructure of your company is fully or partially dead, all your backups - virtual, physical - everything that we managed to reach - are completely removed. Moreover, we have taken a great amount of your corporate data prior to encryption. Well, for now let's keep all the tears and resentment to ourselves and try to build a constructive dialogue. We're fully aware of what damage we caused by locking your internal sources. At the moment, you have to know: 1. Dealing with us you will save A LOT due to we are not interested in ruining your financially. We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you. If you have an active cyber insurance, let us know and we will guide you how to properly use it. Also, dragging out the negotiation process will lead to failing of a deal. 2. Paying us you save your TIME, MONEY, EFFORTS and be back on track within 24 hours approximately. Our decryptor works properly on any files or systems, so you will be able to check it by requesting a test decryption service from the beginning of our conversation. If you decide to recover on your own, keep in mind that you can permanently lose access to some files or accidently corrupt them - in this case we won't be able to help. 3. The security report or the exclusive first-hand information that you will receive upon reaching an agreement is of a great value, since NO full audit of your network will show you the vulnerabilities that we've managed to detect and used in order to get into, identify backup solutions and upload your data. 4. As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog - https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion. 5. We're more than negotiable and will definitely find the way to settle this quickly and reach an agreement which will satisfy both of us. If you're indeed interested in our assistance and the services we provide you can reach out to us following simple instructions: 1. Install TOR Browser to get access to our chat room - https://www.torproject.org/download/. 2. Paste this link - https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion. 3. Use this code - 8207-KO-BXVB-HKJB - to log into our chat. Keep in mind that the faster you will get in touch, the less damage we cause.
URLs

https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion

https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion

Signatures

  • Akira

    Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.

  • Akira family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (8640) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell command to delete shadowcopy.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 47 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2276
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
    1⤵
    • Process spawned unexpected child process
    • Command and Scripting Interpreter: PowerShell
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2100
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\akira_readme.txt

    Filesize

    2KB

    MD5

    de49e2e3eeb866fc517949893ed74bed

    SHA1

    3b503e6776a34f026f77ba7fea719dec182575e6

    SHA256

    994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e

    SHA512

    f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8

  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira

    Filesize

    28KB

    MD5

    59ab9a8be07f7c7dec1962d1c77ad075

    SHA1

    f5747ec9e44e134a2f31f79ba98a4d3a5b515462

    SHA256

    18685621a66548120c001602ff859d0695ea3a03b5e7b3954d285e9ecfce4534

    SHA512

    b6f60da7deba10682d94870c4cadf7feee592cc837c3cae5e5e3c0ea4701c3b274c8db78c94c760d1801476e28ac71ad9d9f11713371b6baf4335cbc9561f9c2

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira

    Filesize

    875B

    MD5

    0dd0ec03fa67ff539bc7fda7832478b5

    SHA1

    d63af6f882526cfb1f2d8c1366f2f04f6f0acb52

    SHA256

    de7c4250fe9a7c501bed7b16cb71f1cd8d3b7b5e238d4d9fa2ee7097ce848001

    SHA512

    a8fad32f937fe256746473ca526d08a510ff7ef91a40a9c110b12918bb11c4063c58431d52018cd89dbe38cc3b62250941f9b5b425a39c1c42a9b082ea35f24e

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira

    Filesize

    756B

    MD5

    b713703d9b025a2039230c7d22835024

    SHA1

    11aa301cdf5ad56e200a6ab95bd64bfcef1700cf

    SHA256

    ca94e8472d731a09960333f05da8ea18759a3098b642682c26c0d6ac22524da0

    SHA512

    2b999b1c5c44f03ccd92c7d4e0b0964136ec0eec92a977a85e9357126287c5919f050e129fd2259d26ea47f5c1d7681061e6aca86dc475529ce1697b387ee866

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.akira

    Filesize

    648B

    MD5

    c107d3bb8b07ac00eef01042ff5dd8a5

    SHA1

    13159ebaaf32a0e3ac29fef8da472f58232d1b2e

    SHA256

    31e1a78cbf1340b127572709f1599635b7dec07475fa243b29637dc4f0fb3add

    SHA512

    6d2ad500936b8397748faa19217cd75ca1d72a3ff45344f024de88cb7bce52dd8b84d693ec870aa41d811850b84964452b47090f362b1b4c2d7e72e3210680e6

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.akira

    Filesize

    647B

    MD5

    22f6fe0db43fda3699f72bd56040ee2e

    SHA1

    9cdfd58ca104d1f54c4ea3b91d884c4c39bb12a8

    SHA256

    90026716d2439429a1065c4e794c89f399bb2cef4fdc446252bca46d66b84468

    SHA512

    48d6d1f5d4dd77051270cd087d172a2c8655dc31d5fd5211f187f514800c94384d8d9a47fcccfdf082a259a0e5231ac60cea1e1b92efe375086f96fcdefa3184

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.akira

    Filesize

    719B

    MD5

    247173d50eed86b181a8528eef0b29f7

    SHA1

    f555c20ed3be225530d9def7196e150fbe439b60

    SHA256

    79bca158e14260778c69f1745a6e6905070fe66e2840149062e098c58fba0eaa

    SHA512

    64a17096cc435f7220c94d652d6e2202a5da0eb0e526bc823b7e15283189fe75bfa0f89d1e6c116adfff765cd68ac515240f66e98c90cb6bde7de6a93eac6f1a

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira

    Filesize

    1KB

    MD5

    41099f7a37b618e714c3e1b0aedd86db

    SHA1

    e75b0b01465c33785ae940ef8e932f9310029015

    SHA256

    97aac7bfd5f8c98565aa24d9d122581301878a3afcaaa1092c4789bd63518276

    SHA512

    960790e35baafb71604c421b51dcaf16ad02d8aea8007ab39087f0204279d0ca4f03886a77a16b70f3a23c33581d4c4c54db60d6d99828b2ddb50c2925b47cad

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira

    Filesize

    1KB

    MD5

    13b97917fdb84ab677a76c4278a0d887

    SHA1

    a6e12a42d6549d4b321a9ae08e694cff6a93ff5a

    SHA256

    baa401815eea41504df55a0d3b6314a1281ee2265a2e747f8fcb9bf4b9fedf45

    SHA512

    20ba31ca90606b3c96273624c8cb9271c0fd87fa2c98acc3a2fe2aabc77897b3d60e4f6e30ab33f6a7d0d640ebdf534ae48082e7c80891267002ebafebf00dd8

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.akira

    Filesize

    1KB

    MD5

    e854958f958233f4b2334551ad4806e2

    SHA1

    15a37150cef04497f847581d6a2d50dd1faf5eac

    SHA256

    e9b9a4e513dc1c881a72cd675a4e28ed0d1f52d819cfa7bfbe8af6b799a55349

    SHA512

    8474fa4f9659c63e2abf7c649e092b4fcfeadd7a8c63c18062181aff3f8aa62bad0df34571edc193a12710f9e0d595e6d2797196df2ec8a086f0498a36a97588

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira

    Filesize

    12KB

    MD5

    961278dce9a6e19fb6a1350a8b7ec396

    SHA1

    b1125cd7729c251b29a67ff0750b0975ecd0964e

    SHA256

    bc33bebacb9d9cf1c02c078469df1daf64f89b3f1e80eb293ce2dded040a3453

    SHA512

    2d516e76b9b1a124b2376080c96363a2ac773a1e18e66feaf46c466877ce2839f9b4984a02c4f3c6da73d906882c39a76253813f3b9c4771b9e2b9f62303781d

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.akira

    Filesize

    9KB

    MD5

    c1d105a14abe489fbf604471e86b9583

    SHA1

    17a6ce28189ba95b9e03fb9511034b3296ccc76e

    SHA256

    94a220700a6ee603ea985968462995f43090f26380f98c7a2e0eb2c92cd7bc91

    SHA512

    84aeaad2d455c8f5762f33b6cf0f9a58b4edea9f68593db13e7491e0c7381da8d27d594b744822171df122a4b225a9ad2c464c9ab87a1ae12b647f8c5e9fbe9b

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.akira

    Filesize

    591B

    MD5

    8056db7b475a7e183ddc6aa9ec465a6a

    SHA1

    f81c02dc514cf5779aedcbb07fd4f0dff3508f3c

    SHA256

    2d629a7088c52eef7153bd749fc819e6da51e2a61587039b9eaf026a4150ca09

    SHA512

    3acb716d2292c96c5b61834c8d5714e1fd65c4aa817e13ca6d96d3fadb41bb5d79c625b9ed130a9b3f7875b2c821802a77669de2228f39ccc992e8687797da7b

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira

    Filesize

    8KB

    MD5

    b4325acba1d964b007434adb875be561

    SHA1

    86686bf69b8ccfc8963e396155f7930536a1e115

    SHA256

    69207de5a3c0ad717baf56664d52ad310faed3f384b09143c6c35b8ccbc3bea2

    SHA512

    9f155699b24cffb991952551c0f1aaf5d27321516b2b3ed40e1e10d61a9ebc51d83bfa5fe4e1626ab94bad42e845c7b21819ad26017e2e39ca892360d9b96099

  • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.akira

    Filesize

    687B

    MD5

    5f58c528c7cc4b90a797fab186d9b2ac

    SHA1

    1bfe872a70b0af18703451301b53606666e662ef

    SHA256

    c6931f10a1df26e08ba864b242856080e3e7e2008fac612a1c041cf69a13437f

    SHA512

    a4e0f9fe3c304471eca66051935227e212cb0320f728e351e04845a5985a692f96bbb18230a4c66b92444f7fae8d24b4fc2ae0bf1e6fc6facfd96cbead969ee2

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.akira

    Filesize

    561B

    MD5

    fe3e0c9fe5c854196dfcefa38a7cd4c8

    SHA1

    2d6ca9a7ee84efa14e1e1dc8f03fd62182a5cf56

    SHA256

    e7e7e28657bd78cbaa8b5e046f5480068cc1f795b4782f93ffa4d4f1dba22dde

    SHA512

    d857b022a11f1366e3fb08b944d9f18fa9bd9bab167c7f2c079d385ac27467e941ac8943b312d2333f394a29a2e10b6dbb64393bf2a33bd18de526e1ab84e2c5

  • C:\Program Files\Java\jre7\lib\zi\Etc\GMT.akira

    Filesize

    561B

    MD5

    4fcb7568c96a11bf89c46be46aaa831c

    SHA1

    72de0ae6910ec0c290bf9348edf4447ef4deba7e

    SHA256

    d0a148fa5b8ee20210b7186a38d7d42fb390077772083e1162e9ef58388cc1fb

    SHA512

    ec13e90b74045d50ed5bb4c92e9acaf2cba17a405ca617604f96e48e8ea3e24dca460916ecc1088711a5a68effbed51e6fe89ad5aaecf41c8ebd6077785c2f28

  • C:\Program Files\Java\jre7\lib\zi\HST.akira

    Filesize

    561B

    MD5

    1f99d5f2853d14b360b082033876eaed

    SHA1

    72fc4a747650f30c707f3a737dcf3ec49a421770

    SHA256

    ff76e1492d17622d8b446decd670d5d5f26a4abe93926541ecc246ea49b14254

    SHA512

    7af4b7de8ab177d664b7066994ab470f3d5f252d7a1e098ca272309316ef36a001b15719e23e8da37be6cf22c7e60c822ef6a6e9af59c05cd6cfc3b4724aa599

  • C:\Program Files\Java\jre7\lib\zi\MST.akira

    Filesize

    561B

    MD5

    ba4d708b9aee12e51ff2497805cf7121

    SHA1

    e3b5ee0bd29a5d9d2f0c4a0775d2109eb91b4545

    SHA256

    cdda2a06a191706842fad0c04a52dff1d8d1b2ae5bbc280c59995160ed4e4602

    SHA512

    f2f4674d689909aa6f741355582bddcfc1640616aa23d66b49298da022731bce97523e5cf727301d2250a91c8dca4eb3082ff47e5fd30beb293ac8e451706dc0

  • C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\vlc.mo.akira

    Filesize

    831KB

    MD5

    93bed83104612f73115e05f2cdb3e644

    SHA1

    3d4823f6820affb4b4da57ec345291ab61fb075c

    SHA256

    5c83ad4ddde72853c80bcb3f60332139cd8c7e42b1cc62dda657642ea2723897

    SHA512

    fb8e36d54374db6031a6015ca467aa7de29291e33f95265285910967987b4d629273e174105a43a91caa1a627a07ab8e92b73ca2c956ec41af9fd4d556841133

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\CURRENT.akira

    Filesize

    550B

    MD5

    cea7b5f8d51e7ed5d2f842350a104601

    SHA1

    0b09f054bec4b83adfb1047ce8429c2c0e5e65c5

    SHA256

    f7fb708d919ce0a2d258c20ce38b66fea5f96854e5c6f1d171c450063897e1de

    SHA512

    405c3c7ec4ab6793f6e637c801f790782a8042588d6d7755f82c58fcf6901bd7ef6ec4b4803c13cbb102ee1ef55256cb6ca7930dd563885ba31e114a8faeadf1

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_2.akira

    Filesize

    8KB

    MD5

    17971fcf6177c132418f6c0651d772a9

    SHA1

    0e63c3529a43a48aa82b80a46bd93454c28ac30e

    SHA256

    22d7a1153b88cae7fb318715294a454ecdf38ecd46605f2d21e79d63a6c75da7

    SHA512

    7c1ab055819d780dcdb687ff5c9a3b80f3a0ae0f7c2ec7548d5e4f78d64117e08b910b2ca7e58eba83419d4c637b5323fb84cca00f4351051fe464877ee293ec

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YLJ4V77F\desktop.ini.akira

    Filesize

    601B

    MD5

    e6501ed3d4bd98342bfc08e678f6a21e

    SHA1

    037ed391e5515a3d6280decf2c930df39628eb77

    SHA256

    dcde82ba4f567f88e9e68bb9edeb6d84919948081776135245f7a53d7b63500e

    SHA512

    e4c65b23ee9339fa8d7d50d09428959deb1de13a9677f6374f6e6f8cf04e13a21721d2c9e0f7a45ab01d51832729e82e7b080e52fcdcb5dd537385f27c7bb7b9

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.akira

    Filesize

    28KB

    MD5

    ced5141c13b84e8325a98c4c50456757

    SHA1

    e9e43a5bc98733f4ae8013b2dc0f6fe7eb03f825

    SHA256

    613f0fa86ba2e1866fe0ffc81c16aa52bf47e1e024a283db8c5846787d919245

    SHA512

    3aca8c7da126a054d810e783dea785404f41ec45b4bafd2c15b8a144e16ec69cdddada8ade96470656184f34d4ac764657ccccefeaa58286f2ec99d03335cd33

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira

    Filesize

    48KB

    MD5

    9440a184f74b404136b2b6add9427468

    SHA1

    28a73d83f6ae08686f5fa72e3e449c6586fa1716

    SHA256

    4060c849b4f4f887ab2bc87d9797edf471093be462e77eca7dd0cbac422c26f4

    SHA512

    70133444775ebfdcb3ff8644fd5299d81b348c15b0cf767229cb108c20ddff0d9baadc7ae0b635eef54229d61aa4ca02d5b80624c3df4190a8fc8a5a04707b06

  • memory/2100-10-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2100-5-0x000000001B580000-0x000000001B862000-memory.dmp

    Filesize

    2.9MB

  • memory/2100-6-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB

  • memory/2100-7-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2100-8-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2100-9-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2100-4-0x000007FEF5FFE000-0x000007FEF5FFF000-memory.dmp

    Filesize

    4KB