Analysis
-
max time kernel
98s -
max time network
112s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-01-2025 11:58
Static task
static1
Behavioral task
behavioral1
Sample
a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe
-
Size
1.0MB
-
MD5
86453f01deb226e67a4f0f24449ca301
-
SHA1
e3c92886733ae58f174f74553abce68826abad5a
-
SHA256
a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2
-
SHA512
b265f7dbb46a8bd05a141688384b03207c1ea9e9f15fdd79e1a8d305640fd809e897e689e9e6ad2bbd126b126424b3c1873c4c6c60f65954daf8c19606644302
-
SSDEEP
12288:Vpp+QIEmDzuImC01vbUE98pik+2i1NkshdMMK+AX99etq2dTdTf:Vpp+Q+u5bUI8pij1NkshdMf99etb5B
Malware Config
Extracted
C:\Program Files\7-Zip\akira_readme.txt
akira
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/2779333196-TRVUX
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 348 4088 powershell.exe 82 -
Renames multiple (8236) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 348 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 28 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Music\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Videos\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Music\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Pictures\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Links\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Public\Documents\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\es-es\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\iexplore.exe.mui a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\ExcelMessageDismissal.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ro-ro\ui-strings.js a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019MSDNR_Retail-ul-oob.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11cryptotoken.md a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\ui-strings.js a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\VideoLAN\VLC\VideoLAN Website.url a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Windows NT\Accessories\ja-JP\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Windows NT\TableTextService\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_organize_18.svg a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-sl\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_K_COL.HXK a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterBold.ttf a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial5-pl.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\print_poster.png a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcDemoR_BypassTrial365-ppd.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Microsoft Office\root\Office16\d714d1f8cc1358b0a424035b88fc18d5.arika a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\THMBNAIL.PNG a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest2-ul-oob.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\applet\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\hu_get.svg a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\THMBNAIL.PNG a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fi-fi\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as80.xsl a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-100.png a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\dom.md a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_forward_18.svg a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\am_get.svg a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONCOMMON.DLL a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\STSLISTI.DLL a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Windows Media Player\uk-UA\wmlaunch.exe.mui a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\akira_readme.txt a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 348 powershell.exe 348 powershell.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe 4188 a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 348 powershell.exe Token: SeBackupPrivilege 1224 vssvc.exe Token: SeRestorePrivilege 1224 vssvc.exe Token: SeAuditPrivilege 1224 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe"C:\Users\Admin\AppData\Local\Temp\a5806174261004a0b8b5c0be808a77e5f25b867a4c522813035c2b0dc05d90a2.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD551cc239856978662c851c9e8669345e6
SHA19d2f64f79ce1d8f1fb005986c4e37f17fd45c77d
SHA256403c570f8da5bc5b7353aa639c71d61814313c78549f616f5f57178fd2902afc
SHA512257750b0665687ad362bd11f79fedfedb88215bda13d1892790bf46c4d54762095467200cffe73c77ea2c39232e78633a7a8acf728a5383da9fc4e5c3d09392c
-
Filesize
3KB
MD54607ca39853b1a48ec47171453ce2365
SHA187151001d54ba1b6737c736b60b8f9f1e23d9c78
SHA256ca96aa4a9c340b219a10afebc71a3c095215f8ed4327f12085c8a4a48fa4f2b9
SHA5122a72f738dbf7812323c380c7f694acbdb45991e978c2e47faa993679996b05c9d34b2365ba8bcfdbeceb84798addbf60d5550d8d88f8de1f705e5e2751ae09d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82