Analysis
-
max time kernel
103s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe
Resource
win10v2004-20250313-en
General
-
Target
e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe
-
Size
1.0MB
-
MD5
834d44a077ef00f7b27c64998d8553a9
-
SHA1
8b941cb9ab2e5d93c9484f29136fdb579c11c7cd
-
SHA256
e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc
-
SHA512
e4d7b33e117161622b04b1622eddac2c17927dfb3ac919192367babf95b16dd69a512e8a96e08694bf094b6a147284955d37ed507550d4ff21ce24b95ba8f19c
-
SSDEEP
24576:FTyLPsJjVjzhWwiENiUGC86pNV2GNxgr+oBwGxGs:FTyLPsJjVjzliE0opNV2G7gr+o+GT
Malware Config
Extracted
C:\fe11fc83a38900fcf766413d81eba9\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/3128244783-SKWFO
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 5200 powershell.exe 88 -
Renames multiple (9696) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1156 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Videos\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Links\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Libraries\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Pictures\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Music\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Music\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Documents\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Searches\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Desktop\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Downloads\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Public\Documents\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\Videos\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosWideTile.contrast-black_scale-125.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\ccloud_retina.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-pl.xrm-ms e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\c822cd574d6b3b17ed3e1b9f6febb5be.arika e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ApothecaryResume.dotx e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\MicrosoftSolitaireMedTile.scale-125.jpg e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-72_contrast-black.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-100_contrast-white.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ul-oob.xrm-ms e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-oob.xrm-ms e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\ResiliencyLinks\Locales\is.pak.DATA e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\AppxMetadata\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.winmd e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsLargeTile.scale-100.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\welcome.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-tw\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\THMBNAIL.PNG e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-400_contrast-white.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-100.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fill-sign.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\affDescription.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\he.pak e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\am.pak.DATA e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.scale-125.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-72.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\da-dk\ui-strings.js e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Doughboy.scale-150.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\WindowsPowerShell\Configuration\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue II.xml e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\example_icons2x.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\wmlaunch.exe.mui e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageMedTile.scale-400.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_File_Transfer_Incoming.m4a e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\OptimizePDF_R_RHP.aapp e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul.xrm-ms e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fil-PH\View3d\3DViewerProductDescription-universal.xml e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-fr\ui-strings.js e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nb-no\ui-strings.js e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\CONCRETE.ELM e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\Icons_Icon_Wind_sm.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\RotateHorizontally.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteWideTile.scale-400.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\ui-strings.js e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\MICROSOFT.DATA.RECOMMENDATION.CLIENT.CORE.DLL e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\MSFT_PackageManagementSource.schema.mfl e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-24_altform-lightunplated.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\de-de\akira_readme.txt e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\CourierStd-Bold.otf e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libbluray-awt-j2se-1.3.2.jar e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\AppxBlockMap.xml e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-20_altform-unplated.png e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_MoveNoDrop32x32.gif e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 1156 powershell.exe 1156 powershell.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe 5356 e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1156 powershell.exe Token: SeBackupPrivilege 5320 vssvc.exe Token: SeRestorePrivilege 5320 vssvc.exe Token: SeAuditPrivilege 5320 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe"C:\Users\Admin\AppData\Local\Temp\e7a44ea5adc366e7600623e7ff433d57cf3ba0bfac8171899497fec6c8a28acc.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5356
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54e84c08edf0adad85a1ba90cb200f61f
SHA17af5f5e49efc858124aae4682141084ff5433a22
SHA25616efeb928950fb092bd302c308a7e10da4684953ec4acdd4fa86b0484e54b8b9
SHA512f75f662cc796f1f199264741315fb8c69e708f5e3a8cf1b7a12974a2adbd40c18149235403d0cbd0119fd031be7b50f765a0d2ca511511fce279598af66cd238
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD520e84c27f16e342bfcb57e5a980b1c0d
SHA1eb44c723bcb323c2ce0cedf54ad1d6a76697e43a
SHA2563d7d6237e988d65b5fa5ac4dbce2700c4c8b2b252aca9f15e10aac3b2bdb4d58
SHA5120695a814de090e229290c787f1a3fa423a926444b961a49a5ffe8107f631555d459d829a3883460a13ce2d3c0f2bd49bb36f9fc856fa9fef3e2461edd139c75d