Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    06-03-2022 04:34

General

  • Target

    3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe

  • Size

    244KB

  • MD5

    35565a07ab5f0da110dc5694cccea587

  • SHA1

    71532453577d0c7ef957a3c47eed5192fa9651c6

  • SHA256

    3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177

  • SHA512

    36d899a706dda4b2b18ccd80d8b97f6c3e1247b9beac6bfe564f841b4f8279f11f127fb8dd8969a704c83244a1553fca32de2867576eb12793986bc67e2c20ae

Malware Config

Extracted

Path

C:\readme-warning.txt

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "makop" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in 0.3bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: [email protected] .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ep bypass -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AEMAbwBwAHkAfAAgAFIAZQBtAG8AdgBlAC0AVwBtAGkATwBiAGoAZQBjAHQA
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3812
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ARQB2AGUAbgB0AGwAbwBnACAALQBMAG8AZwBOAGEAbQBlACAAcwBlAGMAdQByAGkAdAB5AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3808
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ASABpAHMAdABvAHIAeQA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2216
    • C:\Windows\SysWOW64\sc.exe
      sc config LanmanServer start= disabled
      2⤵
        PID:380
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ep bypass -e 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
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
      • C:\Windows\SysWOW64\sc.exe
        sc config LanmanServer start= disabled
        2⤵
          PID:2264
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ASABpAHMAdABvAHIAeQA=
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3880
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ARQB2AGUAbgB0AGwAbwBnACAALQBMAG8AZwBOAGEAbQBlACAAcwBlAGMAdQByAGkAdAB5AA==
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1744
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ep bypass -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AEMAbwBwAHkAfAAgAFIAZQBtAG8AdgBlAC0AVwBtAGkATwBiAGoAZQBjAHQA
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1748
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic shadowcopy delete /nointeractive
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1468
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3348

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1744-181-0x0000000008AD0000-0x0000000008AF2000-memory.dmp

        Filesize

        136KB

      • memory/1744-155-0x0000000007820000-0x0000000007E48000-memory.dmp

        Filesize

        6.2MB

      • memory/1744-157-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/1744-176-0x0000000005135000-0x0000000005137000-memory.dmp

        Filesize

        8KB

      • memory/1744-148-0x00000000050F0000-0x0000000005126000-memory.dmp

        Filesize

        216KB

      • memory/1744-149-0x0000000005130000-0x0000000005131000-memory.dmp

        Filesize

        4KB

      • memory/1744-170-0x0000000005132000-0x0000000005133000-memory.dmp

        Filesize

        4KB

      • memory/1748-169-0x00000000074A2000-0x00000000074A3000-memory.dmp

        Filesize

        4KB

      • memory/1748-178-0x0000000009A10000-0x0000000009AA6000-memory.dmp

        Filesize

        600KB

      • memory/1748-180-0x0000000008D30000-0x0000000008D4A000-memory.dmp

        Filesize

        104KB

      • memory/1748-160-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/1748-171-0x0000000008860000-0x000000000887E000-memory.dmp

        Filesize

        120KB

      • memory/1748-164-0x00000000074A0000-0x00000000074A1000-memory.dmp

        Filesize

        4KB

      • memory/2148-151-0x0000000007530000-0x0000000007531000-memory.dmp

        Filesize

        4KB

      • memory/2148-193-0x0000000009DD0000-0x0000000009DEE000-memory.dmp

        Filesize

        120KB

      • memory/2148-199-0x000000000A070000-0x000000000A078000-memory.dmp

        Filesize

        32KB

      • memory/2148-198-0x000000000A090000-0x000000000A0AA000-memory.dmp

        Filesize

        104KB

      • memory/2148-197-0x000000000A020000-0x000000000A02E000-memory.dmp

        Filesize

        56KB

      • memory/2148-196-0x0000000009FE0000-0x0000000009FEA000-memory.dmp

        Filesize

        40KB

      • memory/2148-195-0x000000000ACE0000-0x000000000B35A000-memory.dmp

        Filesize

        6.5MB

      • memory/2148-194-0x000000007F6B0000-0x000000007F6B1000-memory.dmp

        Filesize

        4KB

      • memory/2148-192-0x000000006F9E0000-0x000000006FA2C000-memory.dmp

        Filesize

        304KB

      • memory/2148-189-0x0000000009DF0000-0x0000000009E22000-memory.dmp

        Filesize

        200KB

      • memory/2148-147-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/2148-152-0x0000000007532000-0x0000000007533000-memory.dmp

        Filesize

        4KB

      • memory/2148-182-0x000000000A0B0000-0x000000000A654000-memory.dmp

        Filesize

        5.6MB

      • memory/2148-179-0x0000000007535000-0x0000000007537000-memory.dmp

        Filesize

        8KB

      • memory/2216-154-0x00000000074E2000-0x00000000074E3000-memory.dmp

        Filesize

        4KB

      • memory/2216-146-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/2216-166-0x0000000008150000-0x00000000081B6000-memory.dmp

        Filesize

        408KB

      • memory/2216-161-0x00000000074E0000-0x00000000074E1000-memory.dmp

        Filesize

        4KB

      • memory/3808-177-0x00000000053E5000-0x00000000053E7000-memory.dmp

        Filesize

        8KB

      • memory/3808-168-0x00000000053E2000-0x00000000053E3000-memory.dmp

        Filesize

        4KB

      • memory/3808-159-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/3808-162-0x00000000053E0000-0x00000000053E1000-memory.dmp

        Filesize

        4KB

      • memory/3812-167-0x00000000076C0000-0x0000000007726000-memory.dmp

        Filesize

        408KB

      • memory/3812-153-0x0000000006862000-0x0000000006863000-memory.dmp

        Filesize

        4KB

      • memory/3812-145-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/3812-163-0x0000000006860000-0x0000000006861000-memory.dmp

        Filesize

        4KB

      • memory/3880-156-0x0000000007432000-0x0000000007433000-memory.dmp

        Filesize

        4KB

      • memory/3880-165-0x0000000007970000-0x0000000007992000-memory.dmp

        Filesize

        136KB

      • memory/3880-158-0x00000000730A0000-0x0000000073850000-memory.dmp

        Filesize

        7.7MB

      • memory/3880-150-0x0000000007430000-0x0000000007431000-memory.dmp

        Filesize

        4KB