Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
akira.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
akira.exe
Resource
win10v2004-20250211-en
General
-
Target
akira.exe
-
Size
1.0MB
-
MD5
1a4a4eb6dfc583c02c70bf83fc0e3cd1
-
SHA1
627f5b93531373e44889553f39e62323edd7db6f
-
SHA256
db9060c4be0fb23d59a7059512c08dd11182e0c47c0d429b2d91af763ca4d28a
-
SHA512
d13d4645b2259028ce6ad723f9fea54c25cf4b4453f279333e9335b3900da55b5c84e7a3b9356f9f0f789afaf9a3add459d8dcff87adec5d7d77ce03e26da7c0
-
SSDEEP
12288:RU/gkiCJVmaeyY1/29UDdxcKw9RKlRm5NulkMekVqjx8FqbzXuv+vS+hX4Ffq7YE:RU/NjjmT2SDdXk8FqbzX9S+2FfdFy
Malware Config
Extracted
C:\PerfLogs\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/3361927117-BWSQJ
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 1416 powershell.exe 30 -
Renames multiple (8618) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 2616 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt akira.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini akira.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini akira.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini akira.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\SMFN3Z3Q\desktop.ini akira.exe File opened for modification C:\Users\Admin\Music\desktop.ini akira.exe File opened for modification C:\Users\Public\Desktop\desktop.ini akira.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini akira.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini akira.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI akira.exe File opened for modification C:\Users\Admin\Documents\desktop.ini akira.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JEDNWX6E\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\DQFI3FMT\desktop.ini akira.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini akira.exe File opened for modification C:\Users\Public\desktop.ini akira.exe File opened for modification C:\Users\Public\Pictures\desktop.ini akira.exe File opened for modification C:\Program Files\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini akira.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini akira.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini akira.exe File opened for modification C:\Users\Admin\Videos\desktop.ini akira.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini akira.exe File opened for modification C:\Users\Public\Documents\desktop.ini akira.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini akira.exe File opened for modification C:\Users\Public\Videos\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini akira.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini akira.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini akira.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini akira.exe File opened for modification C:\Users\Admin\Links\desktop.ini akira.exe File opened for modification C:\Users\Admin\Searches\desktop.ini akira.exe File opened for modification C:\Users\Public\Downloads\desktop.ini akira.exe File opened for modification C:\Users\Public\Libraries\desktop.ini akira.exe File opened for modification C:\Program Files (x86)\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini akira.exe File opened for modification C:\Users\Public\Music\desktop.ini akira.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4FXYHFK9\desktop.ini akira.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ast\akira_readme.txt akira.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\gadget.xml akira.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DVA.api akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02116_.WMF akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Lisbon akira.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\akira_readme.txt akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861258748.profile.gz akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02957_.WMF akira.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\wmlaunch.exe.mui akira.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png akira.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\WhiteDot.png akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Jamaica akira.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png akira.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\THMBNAIL.PNG akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00013_.WMF akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormToolImages.jpg akira.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\weather.js akira.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css akira.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\akira_readme.txt akira.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx akira.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\ImagingDevices.exe.mui akira.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_VideoInset.png akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands_0.10.2.v20140424-2344.jar akira.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\akira_readme.txt akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-progress-ui.jar akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert.css akira.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00783_.WMF akira.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-6 akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Resolute akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Qyzylorda akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304405.WMF akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.net_1.2.200.v20120807-0927.jar akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR00.GIF akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\spacebackupiconsmask.bmp akira.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\Minesweeper.exe.mui akira.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\calendar.html akira.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png akira.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbjvs.inc akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novokuznetsk akira.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\akira_readme.txt akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.zh_CN_5.5.0.165303.jar akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR20F.GIF akira.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\gadget.xml akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107358.WMF akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152690.WMF akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Flow.thmx akira.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\TableTextService.dll.mui akira.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00555_.WMF akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0216724.WMF akira.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Madeira akira.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_m.png akira.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml akira.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\tools.jar akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Essential.xml akira.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\akira_readme.txt akira.exe File created C:\Program Files\Common Files\System\ado\akira_readme.txt akira.exe File opened for modification C:\Program Files\desktop.ini akira.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00195_.WMF akira.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 akira.exe 1720 akira.exe 2616 powershell.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe 1720 akira.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2616 powershell.exe Token: SeBackupPrivilege 320 vssvc.exe Token: SeRestorePrivilege 320 vssvc.exe Token: SeAuditPrivilege 320 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\akira.exe"C:\Users\Admin\AppData\Local\Temp\akira.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD537b571efa365f8a033318074a3049d0e
SHA1407e0b151062a04dd509145ec6951272720515f1
SHA2562eb4b6a9aaab909d22d80a7328b7d69f915eb2b2c242ecf645814539d32d2318
SHA5128ebf0a2b29957cc6bc0694d26f7e6ed0bbcffe5dca9e7d79afcf3467a07413c5664c0f7e987262f7b5b471ed48d98ca6297734ff634bb17229638bfd9276961e