Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
431s -
max time network
434s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/03/2025, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe
Resource
win11-20250217-en
General
-
Target
a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe
-
Size
1.0MB
-
MD5
b5873a60af597ce01867fede65c2846f
-
SHA1
73aaafee11af4949d8bef1dea2a18b882b073d41
-
SHA256
a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6
-
SHA512
4ae26589b17001f28d6327ecff66ad65fc1e235738b82ed17b24e7129c9976fd9948c79907a4ed41667f0acf2b9f89299400bdba27a0881255b3e79b21f642b6
-
SSDEEP
24576:FTyLPsJjVjzhWwiENiUGC86pNV2GNxgr+oBwG7Gs:FTyLPsJjVjzliE0opNV2G7gr+o+Gp
Malware Config
Extracted
C:\Program Files (x86)\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/5954206765-VJFFW
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 1360 powershell.exe 77 -
Renames multiple (9131) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 4872 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 30 IoCs
description ioc Process File opened for modification C:\Users\Admin\Searches\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Downloads\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Pictures\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Videos\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Documents\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Links\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\Music\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Music\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Users\Public\desktop.ini a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.42251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-125.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-150_contrast-white.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-20_altform-unplated_contrast-white.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-80_altform-unplated.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fi-fi\ui-strings.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\contrast-black\PowerAutomateSquare70x70Logo.scale-80.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailSmallTile.scale-150.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.50.24002.0_x64__8wekyb3d8bbwe\Assets\MixerBranding\mixer_logo.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\core_icons.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\root\ui-strings.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\help.svg a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\bin\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-100_contrast-black.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.targetsize-80_altform-unplated_contrast-white.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-pl.xrm-ms a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\hu-hu\ui-strings.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\zh-TW.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\contrast-white\PowerAutomateSquare71x71Logo.scale-100.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\vlc.mo a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\ui-strings.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\Locales\pt-BR.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\132.0.2957.140\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\kok.pak.DATA a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\CameraAppList.targetsize-64.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\TXP_3color_CarRental_378_Dark.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.targetsize-30.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fi-fi\ui-strings.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-pl.xrm-ms a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedge_200_percent.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-60_altform-unplated_contrast-white.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-200.HCWhite.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\Theme_Illustration_Seasons_Summer_Left.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\components\GroupedList\GroupShowAll.styles.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\gu.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\java.policy a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\plugin.js a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CENTEURO.TXT a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\1033\e7b218887ebb51a213812344d6a7b27c.arika a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\RemoveSearch.vdx a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintSmallTile.scale-200.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorMedTile.scale-100.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Cyrl-RS\msipc.dll.mui a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\office.x-none.msi.16.x-none.vreg.dat a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\contrast-black\GetHelpAppList.targetsize-16_altform-lightunplated_contrast-black.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintLargeTile.scale-100.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxMailSmallTile.scale-400.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-20_contrast-black.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\Theme_Photo_DeepSea_Background.jpg a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-140.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\90.0.818.66\Locales\mt.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\WeatherAppList.targetsize-32_contrast-black.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-pl.xrm-ms a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\Locales\devtools\ru.pak a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\akira_readme.txt a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libbluray-j2se-1.3.2.jar a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailBadge.scale-100.png a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\MuiCache Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheVersion = "1" Music.UI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheVersion = "1" Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache Music.UI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheVersion = "1" Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache Music.UI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content Music.UI.exe Key created \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies Music.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2800786028-4028220528-1905518260-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" Music.UI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 4872 powershell.exe 4872 powershell.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe 3256 a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4872 powershell.exe Token: SeBackupPrivilege 5924 vssvc.exe Token: SeRestorePrivilege 5924 vssvc.exe Token: SeAuditPrivilege 5924 vssvc.exe Token: SeManageVolumePrivilege 3964 Music.UI.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3964 Music.UI.exe 2228 MiniSearchHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe"C:\Users\Admin\AppData\Local\Temp\a0cf7860499118926c61f08dc2e6b8701b90f16cf3887aebf79111e6ac2763c6.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5924
-
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_x64__8wekyb3d8bbwe\Music.UI.exe"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_x64__8wekyb3d8bbwe\Music.UI.exe" -ServerName:Microsoft.ZuneMusic.AppX48dcrcgzqqdshm3kf61t0cm5e9pyd6h6.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2124
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a634d7c034bdd75be5ccbba96acd2fbd
SHA10c40ce9f9010cdef7b577925e676f005eaf60caa
SHA2564f6c6f2b166e573c09683bef0128b407491a912926f2ac0671c66da46fad9689
SHA51232b6a80fee866a333b47f902508f6455a7544713d935883b72688080156fc91de39379a432fc21305dc741420b7572c45c40b25ba71abaa211c48d5046dd22d1
-
Filesize
3KB
MD5eac3bf02fb0ef3c44c62fd2c11f93637
SHA123cbc758639039276926fbe084bc3a209cc204a1
SHA2566bbc1c3853fe7f73bb285d5b0ae19aea6003afaf64a8b34d790c64eeb8a254b4
SHA5126bdd4004dfbc7d34f86cec7ad463ec501256649a63d2c42da194940690a7e3b949306d3052376e39770104004665b3af9ff70bd5f68b0ede7452013ce46e0c80
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Filesize3.5MB
MD5a7c6aab0b7f11341d9facd2a579bf177
SHA107847b51131b7aa8177a8d0bfaa80dff53193bf5
SHA2568d4b8b3240054195122939fe1a0223713cae4cb17ae61c2ec4b214a51c572c72
SHA5124e4b27d644e57ee7a538e287047d4e8c35524ed055f44afdb04bd31f18440472e5790c3e5e86b76ecad81c46590138cc3e703466bba966a2ca0a2bf1104e0fa7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
Filesize16KB
MD5d1178ada3d00cfe87251bdd022377603
SHA15d385d6f38c84a01bc8f541ade8cc8e7abd2680e
SHA256dc95a4b0f0becf3a5378648b82ff4e38c411cf1ca09735e3074296ba9f5740f9
SHA5128fee66d191e32ab762390952a33c2cbcbd5df7e44647b80eec5d03e8036643663af5e8614001c7d4655d222aaae575d8fc4b9a7a104a210f30087659bf22ea29
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
Filesize8KB
MD56b9590590d85d37135dc2394c7b1a7ec
SHA15d1d40c3b23a1b6393ae070e74c23ef2270021b6
SHA2568d6ebea993bfbedce70c0fd1ee9c47ae33a028bf30c77aab191a3e5e2bea65bc
SHA51206f4d49a144004abf631636d59947c06266e2ef3c65598a82a65b5f4f594f57d93d88188affa4d2b33f1553025ab644fe202fd85da8ec3ef4f61979d70abf1af
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
Filesize2.0MB
MD5f2ce59d7f4bc62b42595f07e46975f0a
SHA1d6ef7b9d8145b266f4cece6b27e3b17b695e9d5c
SHA256fef977c2f983e38d01c551e5314c5c55eaa46b93eb298bbac4374a1e2ad9054d
SHA512c6b8fe56d6baccad7215b6677c45153cb3dfb3321b437f531b6fdb4311fc0c43c844d19fbc88e65deeea03f768e7173fc34ae62cdb1f4229f7e9f9294ad6b147
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
Filesize2.0MB
MD5b2d1236c286a3c0704224fe4105eca49
SHA17d76d48d64d7ac5411d714a4bb83f37e3e5b8df6
SHA2565647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee
SHA512731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Filesize256KB
MD50b9763aaafeed6ed2dba52b7b4b4982e
SHA1048748e3b396f5d4c7eb3597f9da0f560eef333e
SHA256bbf209380d3db5b515bc7c10e785691e183264ecb35b7cfec9a4746e7aca91cd
SHA5125f12c44bf33663422badec78b3ca5efd094c7aa64705472c6f3b85b67ade1bcf2c3b99f10e239d9e87a4529b514cfa2235afb2522f714b24e116d98ce053e4b9
-
Filesize
217B
MD59b18cc7b22f0ac17284814944aa344aa
SHA1afff8d4b3fa83e6a3324ac9adb3c5401d37854ff
SHA2565650dbfdeb874725c2e996c47801254f505d8964a31bcb3f2d647e262428dd34
SHA512fb2f221c621d94cc1dc966221e662f32903a0d5fca07b1f1391dd07022cb17db17e51e55fc4f4e6f1fb62dcba68d070359b420bd2d691b0f898c9b66d2aeec9f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82