Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2025, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
akira.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
akira.exe
Resource
win10v2004-20250211-en
General
-
Target
akira.exe
-
Size
1.0MB
-
MD5
1a4a4eb6dfc583c02c70bf83fc0e3cd1
-
SHA1
627f5b93531373e44889553f39e62323edd7db6f
-
SHA256
db9060c4be0fb23d59a7059512c08dd11182e0c47c0d429b2d91af763ca4d28a
-
SHA512
d13d4645b2259028ce6ad723f9fea54c25cf4b4453f279333e9335b3900da55b5c84e7a3b9356f9f0f789afaf9a3add459d8dcff87adec5d7d77ce03e26da7c0
-
SSDEEP
12288:RU/gkiCJVmaeyY1/29UDdxcKw9RKlRm5NulkMekVqjx8FqbzXuv+vS+hX4Ffq7YE:RU/NjjmT2SDdXk8FqbzX9S+2FfdFy
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/3361927117-BWSQJ
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 1528 powershell.exe 85 -
Renames multiple (8683) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 3856 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt akira.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini akira.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini akira.exe File opened for modification C:\Users\Admin\Videos\desktop.ini akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI akira.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini akira.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini akira.exe File opened for modification C:\Users\Public\Desktop\desktop.ini akira.exe File opened for modification C:\Users\Public\Music\desktop.ini akira.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini akira.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini akira.exe File opened for modification C:\Users\Admin\Music\desktop.ini akira.exe File opened for modification C:\Users\Public\Downloads\desktop.ini akira.exe File opened for modification C:\Users\Public\Libraries\desktop.ini akira.exe File opened for modification C:\Users\Public\Videos\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini akira.exe File opened for modification C:\Users\Admin\Searches\desktop.ini akira.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini akira.exe File opened for modification C:\Users\Public\Documents\desktop.ini akira.exe File opened for modification C:\Program Files (x86)\desktop.ini akira.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini akira.exe File opened for modification C:\Users\Admin\Documents\desktop.ini akira.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini akira.exe File opened for modification C:\Users\Public\desktop.ini akira.exe File opened for modification C:\Users\Public\Pictures\desktop.ini akira.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini akira.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini akira.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini akira.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini akira.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini akira.exe File opened for modification C:\Users\Admin\Links\desktop.ini akira.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini akira.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\Accessories\en-US\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\WideTile.scale-125.png akira.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-96_altform-unplated.png akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-96_altform-lightunplated.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailMediumTile.scale-400.png akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_link_18.svg akira.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaBrightDemiItalic.ttf akira.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\da-dk\akira_readme.txt akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\LyncVDI_Eula.txt akira.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\changelog.txt akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\AppxSignature.p7x akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\3039_32x32x32.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailMediumTile.scale-150.png akira.exe File opened for modification C:\Program Files\Common Files\System\ado\msadomd28.tlb akira.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\akira_readme.txt akira.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\SuggestionsService\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Advanced-Dark.scale-400.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Outlook.scale-100.png akira.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GameBar_SmallTile.scale-125.png akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\msjet.xsl akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\Settings-Black.png akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\virgo-new-folder.svg akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\[email protected] akira.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\java.settings.cfg akira.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\akira_readme.txt akira.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-80_altform-unplated.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-GoogleCloudCacheMini.scale-125.png akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\main-selector.css akira.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-sl\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Pyramid.Medium.png akira.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.scale-200.png akira.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\akira_readme.txt akira.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\zlib.md akira.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\akira_readme.txt akira.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\In.Tests.ps1 akira.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\34.jpg akira.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_sent.gif akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Exchange.scale-400.png akira.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-256_altform-lightunplated.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-16.png akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\MedTile.scale-200.png akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ppd.xrm-ms akira.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\akira_readme.txt akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\ui-strings.js akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-ppd.xrm-ms akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMT.TTF akira.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\akira_readme.txt akira.exe File opened for modification C:\Program Files\Windows Photo Viewer\uk-UA\PhotoAcq.dll.mui akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reject_18.svg akira.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\165.png akira.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\akira_readme.txt akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft_WebMediaExtensions.winmd akira.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\plugin.js akira.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\build.psake.ps1 akira.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageStoreLogo.scale-400_contrast-white.png akira.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml akira.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 akira.exe 2584 akira.exe 3856 powershell.exe 3856 powershell.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe 2584 akira.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3856 powershell.exe Token: SeBackupPrivilege 976 vssvc.exe Token: SeRestorePrivilege 976 vssvc.exe Token: SeAuditPrivilege 976 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\akira.exe"C:\Users\Admin\AppData\Local\Temp\akira.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD537b571efa365f8a033318074a3049d0e
SHA1407e0b151062a04dd509145ec6951272720515f1
SHA2562eb4b6a9aaab909d22d80a7328b7d69f915eb2b2c242ecf645814539d32d2318
SHA5128ebf0a2b29957cc6bc0694d26f7e6ed0bbcffe5dca9e7d79afcf3467a07413c5664c0f7e987262f7b5b471ed48d98ca6297734ff634bb17229638bfd9276961e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82