Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe
Resource
win10v2004-20250314-en
General
-
Target
ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe
-
Size
1.0MB
-
MD5
205589629ead5d3c1d9e914b49c08589
-
SHA1
3c1d57a054f3bee458754c24de73af6450ffdfb4
-
SHA256
ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3
-
SHA512
8b81546112a6f0b4c1390c0da318d3f7431e34e750ce8718e95c3c9da69e497aec617102e17244bce0439b11bc7addd64f89463c9f1ee9346f50717363ab193e
-
SSDEEP
24576:zQagXrs6xiS7Ay/i4NBqThb23KAwcCcoVDqs:zQa36bg4NBqT1VAwfcoVL
Malware Config
Extracted
C:\Program Files\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/d/0628191501-BDPUC
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Akira family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5760 4948 powershell.exe 88 -
Renames multiple (9715) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 5760 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Music\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Videos\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Links\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Documents\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Music\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Users\Public\desktop.ini ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\PREVIEW.GIF ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PIXEL\THMBNAIL.PNG ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeLargeTile.scale-100.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-250.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100_contrast-white.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32ww.msi.16.x-none.xml ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailMediumTile.scale-125.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ar-ae\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8en.dub ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-48_altform-unplated_contrast-white.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreMedTile.scale-200.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\AppxManifest.xml ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\WideTile.scale-100.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_Full.aapp ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\chrome_installer.log ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\freebxml.md ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\LargeTile.scale-125.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-256_altform-unplated.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-24_altform-unplated_contrast-black.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-unplated.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\tzmappings ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\tr-tr\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ca-es\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.targetsize-16.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarBadge.scale-400.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ul-phn.xrm-ms ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\caution.svg ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageWideTile.scale-100_contrast-black.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Edge.dat.LOG1 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\27.jpg ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\EndOfLife\Assets\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSplashScreen.scale-150_contrast-white.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-256_altform-unplated_contrast-high.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ja-jp\ui-strings.js ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\822d9bad25e2a51d3df38b5af4942fde.arika ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-20.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\sunjce_provider.jar ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\da-dk\ui-strings.js ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\custom_poster.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ul-oob.xrm-ms ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Mu\Social ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-16_contrast-white.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nb-no\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-phn.xrm-ms ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\wmpnssui.dll.mui ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\internal.identity_helper.exe.manifest ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\pa.pak ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderSplashScreen.contrast-black_scale-100.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-64_altform-unplated_contrast-high.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\BeGreaterThan.ps1 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\pl.pak ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Outlook.scale-100.png ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\cursors.properties ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\akira_readme.txt ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\openssl64.dlla.manifest ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 5760 powershell.exe 5760 powershell.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe 4056 ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5760 powershell.exe Token: SeBackupPrivilege 1572 vssvc.exe Token: SeRestorePrivilege 1572 vssvc.exe Token: SeAuditPrivilege 1572 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe"C:\Users\Admin\AppData\Local\Temp\ae455890e2123a9d011e47065828b0a03c08fd66570fab9d0340d2f5d5eb40c3.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58d5c0c4b3f8ba6154f269d41fb4ae0bf
SHA1f54c99106823a57fd6ef31d5c43767f4ce580d4f
SHA25692bfe213fc85dea5d8248570b32dc4c82fc934ed6a03b842643171465de20bbd
SHA512ee76730461711aba1427b3e2ce884a916582379a345b31a59e2ba6a952f4863489ad08256f42aec3b2ab3c3df5ffc3a90ad735de732d77f47c2c42af07264961
-
Filesize
3KB
MD58bc1aa7ffa1095837e73b7cc10ee3867
SHA1c4bdfae4ee08bbfc6d88c90941d166990349625f
SHA256b4b1af1e21e711d1f4c701e3bdf27022961cb9bc9dea074e194007c4800a58b9
SHA5124ea39f3b95e19b74851f0186ba76b8a8ce7d176dc5bbc6de741d04f0a98bf89cc257df1060a38007566dff65c5b6786b0a76b7f552c6dbe9ecb80e8353eafad5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82