File name:

Akira Client.zip.zip

Full analysis: https://app.any.run/tasks/521ede2f-380e-4d01-a30a-e1982dc6f4b9
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: November 26, 2023, 11:53:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
loader
netsupport
remote
unwanted
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

168C53A46A9BE431DC81829F663EA7C6

SHA1:

D7D2DAF929FD8DB3483D9A5D2EF187FC21C73568

SHA256:

2A1D0F433CB37965C86F48A462E6E5E3BB9E781C13AD8D3E6A265416A358E39C

SSDEEP:

49152:dXaZUxcoCN9EEuwdv2VpCHhrI6oRHsGiPDwRgl8EjZBm0Yc2WUKOFGVB0jmEeM8a:MWxQN2zcv2VpOI6oRHLiPF8yzQ2OFGVE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Akira Client.exe (PID: 3140)
      • Akira Client.exe (PID: 3216)
      • setup.exe (PID: 2728)
      • setup.tmp (PID: 3332)
      • Akira Client.tmp (PID: 3200)
      • a1.exe (PID: 3252)
      • a1.tmp (PID: 3240)
    • Connects to the CnC server

      • wmiprvse.exe (PID: 3512)
    • NETSUPPORT has been detected (SURICATA)

      • wmiprvse.exe (PID: 3512)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 3060)
    • Reads the Windows owner or organization settings

      • Akira Client.tmp (PID: 3200)
      • setup.tmp (PID: 3332)
      • a1.tmp (PID: 3240)
    • Reads the Internet Settings

      • Akira Client.tmp (PID: 3200)
      • setup.tmp (PID: 3332)
      • cmd.exe (PID: 3456)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
    • Reads security settings of Internet Explorer

      • setup.tmp (PID: 3332)
    • Reads settings of System Certificates

      • setup.tmp (PID: 3332)
    • Checks Windows Trust Settings

      • setup.tmp (PID: 3332)
    • Adds/modifies Windows certificates

      • setup.exe (PID: 2728)
    • Process drops legitimate windows executable

      • a1.tmp (PID: 3240)
      • expand.exe (PID: 4020)
    • The process drops C-runtime libraries

      • a1.tmp (PID: 3240)
      • expand.exe (PID: 4020)
    • Starts CMD.EXE for commands execution

      • a1.tmp (PID: 3240)
    • Searches for installed software

      • setup.tmp (PID: 3332)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 4044)
    • Connects to the server without a host name

      • wmiprvse.exe (PID: 3512)
    • Process requests binary or script from the Internet

      • setup.tmp (PID: 3332)
    • Connects to unusual port

      • wmiprvse.exe (PID: 3512)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 476)
      • expand.exe (PID: 4020)
    • Manual execution by a user

      • WinRAR.exe (PID: 476)
      • WinRAR.exe (PID: 1444)
      • Akira Client.exe (PID: 3216)
      • wmpnscfg.exe (PID: 2896)
      • msedge.exe (PID: 3020)
      • wmpnscfg.exe (PID: 2492)
    • Checks supported languages

      • Akira Client.exe (PID: 3216)
      • Akira Client.tmp (PID: 2336)
      • Akira Client.exe (PID: 3140)
      • Akira Client.tmp (PID: 3200)
      • setup.tmp (PID: 3332)
      • setup.exe (PID: 2728)
      • a1.exe (PID: 3252)
      • a1.tmp (PID: 3240)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
      • wmpnscfg.exe (PID: 2492)
      • wmpnscfg.exe (PID: 2896)
    • Reads the computer name

      • Akira Client.tmp (PID: 2336)
      • Akira Client.tmp (PID: 3200)
      • wmpnscfg.exe (PID: 2896)
      • setup.tmp (PID: 3332)
      • a1.tmp (PID: 3240)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
      • wmpnscfg.exe (PID: 2492)
    • Create files in a temporary directory

      • Akira Client.exe (PID: 3216)
      • Akira Client.exe (PID: 3140)
      • setup.exe (PID: 2728)
      • a1.exe (PID: 3252)
      • a1.tmp (PID: 3240)
      • setup.tmp (PID: 3332)
      • a2.exe (PID: 3136)
      • Akira Client.tmp (PID: 3200)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2896)
      • setup.tmp (PID: 3332)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
      • wmpnscfg.exe (PID: 2492)
    • Checks proxy server information

      • setup.tmp (PID: 3332)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
    • Creates files in the program directory

      • Akira Client.tmp (PID: 3200)
      • a1.tmp (PID: 3240)
      • expand.exe (PID: 4020)
    • Creates files or folders in the user directory

      • setup.tmp (PID: 3332)
      • wmiprvse.exe (PID: 3512)
      • a2.exe (PID: 3136)
    • Drop NetSupport executable file

      • expand.exe (PID: 4020)
    • Application launched itself

      • msedge.exe (PID: 3340)
      • msedge.exe (PID: 3020)
    • Reads mouse settings

      • a2.exe (PID: 3136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2023:11:26 11:53:28
ZipCRC: 0x98f371ab
ZipCompressedSize: 1112171
ZipUncompressedSize: 1672076
ZipFileName: Akira Client.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
94
Monitored processes
46
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs akira client.exe no specs akira client.tmp no specs akira client.exe akira client.tmp wmpnscfg.exe no specs setup.exe no specs setup.tmp a1.exe no specs a1.tmp no specs cmd.exe no specs expand.exe no specs cmd.exe no specs reg.exe no specs #NETSUPPORT wmiprvse.exe cmd.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs a2.exe msedge.exe no specs msedge.exe no specs ntvdm.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4012 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
476"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Akira Client.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
824"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3368 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
880"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2560 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
900"cmd.exe" /c expand C:\Users\admin\AppData\Local\Temp\is-7O47F.tmp\{app}\tkveum.cab -F:* %ProgramData%C:\Windows\System32\cmd.exea1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1356"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3404 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1444"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Akira Client.zip.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1496"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1508 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1840"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1300,i,6864843825782331572,2517805395823771171,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2088"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xf0,0x6b38f598,0x6b38f5a8,0x6b38f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
17 055
Read events
16 839
Write events
203
Delete events
13

Modification events

(PID) Process:(3060) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
47
Suspicious files
129
Text files
80
Unknown types
0

Dropped files

PID
Process
Filename
Type
3140Akira Client.exeC:\Users\admin\AppData\Local\Temp\is-9UA59.tmp\Akira Client.tmpexecutable
MD5:C0D2F8F2399AE2890934F34F90ACB86D
SHA256:97563A5BAEA501A9B39DB70299D792BE7977B689315C3CED5BC8F2CE00BE1C63
1444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1444.15740\Akira Client.zipcompressed
MD5:7FD8217E14266181C56D1DF82D8AD3B3
SHA256:A07E0F99658E8583199ECECA656B98974779BB840CB8D52C6A13B26FE78E0729
476WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa476.17110\Akira Client.exeexecutable
MD5:B1F839C3204051F049EAFD0754D79090
SHA256:C01F0A1E3306DEC50229721A4C2655EB5C12732791E6653BCD7A1BEC202EE5AF
3060WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3060.12776\Akira Client.zipcompressed
MD5:7FD8217E14266181C56D1DF82D8AD3B3
SHA256:A07E0F99658E8583199ECECA656B98974779BB840CB8D52C6A13B26FE78E0729
3200Akira Client.tmpC:\Users\admin\AppData\Local\Temp\is-L4K16.tmp\erkutext
MD5:03C4664126B20BC739F89ED0F4E74AB2
SHA256:B5C9E73FFB3626B0E3451632C834EED4DCFB266068A08632AEC75371C749136C
3216Akira Client.exeC:\Users\admin\AppData\Local\Temp\is-0T5II.tmp\Akira Client.tmpexecutable
MD5:C0D2F8F2399AE2890934F34F90ACB86D
SHA256:97563A5BAEA501A9B39DB70299D792BE7977B689315C3CED5BC8F2CE00BE1C63
3200Akira Client.tmpC:\Users\admin\AppData\Local\Temp\is-L4K16.tmp\is-AVNOF.tmptext
MD5:444BCB3A3FCF8389296C49467F27E1D6
SHA256:2689367B205C16CE32ED4200942B8B8B1E262DFC70D9BC9FBC77C49699A4F1DF
3200Akira Client.tmpC:\Users\admin\AppData\Local\Temp\is-L4K16.tmp\setup.exeexecutable
MD5:A089DE372689E026446DF26C104DE983
SHA256:5F20F42A966084F33B3E1AEB5BF450C146DE71538580B1D40346CF876BE770F0
3200Akira Client.tmpC:\Program Files\Akira Client.exe\unins000.exeexecutable
MD5:17BAED4D90E413474423C1560F883584
SHA256:A0E78BFE9F5EE31D35581F57200FDA7026C85A4605C3547029B31D527462A73D
3200Akira Client.tmpC:\Users\admin\AppData\Local\Temp\is-L4K16.tmp\is-BK3SA.tmpexecutable
MD5:A089DE372689E026446DF26C104DE983
SHA256:5F20F42A966084F33B3E1AEB5BF450C146DE71538580B1D40346CF876BE770F0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
44
DNS requests
56
Threats
33

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3332
setup.tmp
GET
200
87.248.205.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?6991284cb41a101b
unknown
compressed
61.6 Kb
unknown
3332
setup.tmp
GET
200
23.212.210.158:80
http://x2.c.lencr.org/
unknown
binary
300 b
unknown
3332
setup.tmp
GET
200
23.212.210.158:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
3332
setup.tmp
GET
200
184.24.77.67:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPXvFgZTnegQocWvQARpRx%2B5A%3D%3D
unknown
binary
503 b
unknown
1080
svchost.exe
GET
304
87.248.205.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8aef2fa3cb5e0a37
unknown
unknown
3512
wmiprvse.exe
POST
200
194.38.21.53:1203
http://194.38.21.53/fakeurl.htm
unknown
binary
61 b
unknown
3512
wmiprvse.exe
GET
200
51.142.119.24:80
http://geo.netsupportsoftware.com/location/loca.asp
unknown
text
15 b
unknown
3332
setup.tmp
GET
200
104.21.90.147:80
http://send.planewool.xyz/track_inl2EU.php?tim=1700999703&poid=2477&p=0.7
unknown
text
3 b
unknown
3332
setup.tmp
GET
200
188.114.97.3:80
http://ou.dimeflowers.website/ar.php?d=inno&r=offer_execution&rk=yes&o=1645&a=2477&dn=386&spot=2&t=1700999703
unknown
text
2 b
unknown
3512
wmiprvse.exe
POST
200
194.38.21.53:1203
http://194.38.21.53/fakeurl.htm
unknown
binary
160 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3200
Akira Client.tmp
104.21.52.223:80
sparksteam.site
CLOUDFLARENET
unknown
3200
Akira Client.tmp
104.21.93.211:80
clamstew.website
CLOUDFLARENET
unknown
3332
setup.tmp
188.114.97.3:443
ou.dimeflowers.website
CLOUDFLARENET
NL
unknown
3332
setup.tmp
87.248.205.0:80
ctldl.windowsupdate.com
LLNW
US
unknown
3332
setup.tmp
23.212.210.158:80
x1.c.lencr.org
AKAMAI-AS
AU
unknown
1080
svchost.exe
87.248.205.0:80
ctldl.windowsupdate.com
LLNW
US
unknown

DNS requests

Domain
IP
Reputation
sparksteam.site
  • 104.21.52.223
  • 172.67.204.180
unknown
clamstew.website
  • 104.21.93.211
  • 172.67.214.200
unknown
ou.dimeflowers.website
  • 188.114.97.3
  • 188.114.96.3
unknown
ctldl.windowsupdate.com
  • 87.248.205.0
whitelisted
x1.c.lencr.org
  • 23.212.210.158
whitelisted
x2.c.lencr.org
  • 23.212.210.158
whitelisted
www.zmukel.cloud
  • 185.154.15.70
unknown
r3.o.lencr.org
  • 184.24.77.67
  • 184.24.77.79
  • 184.24.77.54
shared
send.planewool.xyz
  • 104.21.90.147
  • 172.67.157.197
unknown
geo.netsupportsoftware.com
  • 51.142.119.24
  • 62.172.138.8
  • 62.172.138.67
unknown

Threats

PID
Process
Class
Message
3200
Akira Client.tmp
Possibly Unwanted Program Detected
ET ADWARE_PUP Win32/TrojanDownloader Variant Activity (GET)
3200
Akira Client.tmp
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
3200
Akira Client.tmp
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
3200
Akira Client.tmp
Misc activity
ET INFO EXE - Served Attached HTTP
3200
Akira Client.tmp
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
3512
wmiprvse.exe
Potential Corporate Privacy Violation
ET POLICY NetSupport GeoLocation Lookup Request
3512
wmiprvse.exe
Misc activity
ET INFO NetSupport Remote Admin Checkin
3512
wmiprvse.exe
Misc activity
ET INFO NetSupport Remote Admin Response
3512
wmiprvse.exe
Misc activity
ET INFO NetSupport Remote Admin Checkin
14 ETPRO signatures available at the full report
No debug info