Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27/04/2022, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
이력서(엑셀버전).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
이력서(엑셀버전).exe
Resource
win10v2004-20220414-en
General
-
Target
이력서(엑셀버전).exe
-
Size
710KB
-
MD5
7a668b5ec9a34afa512e471a20b8f932
-
SHA1
e53653edc907842c577b3c6dda208a60b409ced8
-
SHA256
b7e574928412c8142c2a1d9b1c35fcc9e698dd79291ba808d41407d8d06cbe29
-
SHA512
f98ab8477997c01c17031d1312293626032e600f8af8081b0aee07176b15fe91ae305e4c4e48ed30491ae0e3a374347c5bfcf804c3315b1e8b18efadf3107789
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\wow64_microsoft-windows-a..nce-tools.resources_31bf3856ad364e35_6.1.7600.16385_it-it_0cf159f3820f394b\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 996 wbadmin.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 이력서(엑셀버전).exe 1996 이력서(엑셀버전).exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1704 set thread context of 2036 1704 이력서(엑셀버전).exe 27 PID 1996 set thread context of 1604 1996 이력서(엑셀버전).exe 41 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\pagecurl.png 이력서(엑셀버전).exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_select-highlight.png 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-api-annotations-common.jar 이력서(엑셀버전).exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\readme-warning.txt 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jre7\lib\currency.data 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01084_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02039U.BMP 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.zh_CN_5.5.0.165303.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\flyoutBack.png 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\STRTEDGE.ELM 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00276_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105292.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153089.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-plaf.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\vlc.mo 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\3.png 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.contexts_1.3.100.v20140407-1019.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\vlc.mo 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\LAYERS.INF 이력서(엑셀버전).exe File created C:\Program Files\Java\jre7\lib\management\readme-warning.txt 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178932.JPG 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.artifact.repository.prefs 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActions.exsd 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\ECLIPSE.ELM 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00810_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02957_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vienna 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-ui.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200467.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider_right.png 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03466_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-coredump.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jre7\lib\psfont.properties.ja 이력서(엑셀버전).exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\MoreGames.dll.mui 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10 이력서(엑셀버전).exe File opened for modification C:\Program Files\SkipUnprotect.potx 이력서(엑셀버전).exe File opened for modification C:\Program Files\BackupAssert.wpl 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\tesselate.x3d 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02267_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl.png 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00057_.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152882.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml 이력서(엑셀버전).exe File opened for modification C:\Program Files\DVD Maker\Shared\Common.fxh 이력서(엑셀버전).exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\bckgRes.dll.mui 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedQuanPin.txt 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185786.WMF 이력서(엑셀버전).exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02187_.GIF 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Yekaterinburg 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Oslo 이력서(엑셀버전).exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\vlc.mo 이력서(엑셀버전).exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\flyout.css 이력서(엑셀버전).exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm 이력서(엑셀버전).exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg 이력서(엑셀버전).exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui_5.5.0.165303.jar 이력서(엑셀버전).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2004 1704 WerFault.exe 26 1904 1996 WerFault.exe 29 -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1116 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 이력서(엑셀버전).exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1704 이력서(엑셀버전).exe 1996 이력서(엑셀버전).exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1764 vssvc.exe Token: SeRestorePrivilege 1764 vssvc.exe Token: SeAuditPrivilege 1764 vssvc.exe Token: SeBackupPrivilege 1476 wbengine.exe Token: SeRestorePrivilege 1476 wbengine.exe Token: SeSecurityPrivilege 1476 wbengine.exe Token: SeIncreaseQuotaPrivilege 1344 WMIC.exe Token: SeSecurityPrivilege 1344 WMIC.exe Token: SeTakeOwnershipPrivilege 1344 WMIC.exe Token: SeLoadDriverPrivilege 1344 WMIC.exe Token: SeSystemProfilePrivilege 1344 WMIC.exe Token: SeSystemtimePrivilege 1344 WMIC.exe Token: SeProfSingleProcessPrivilege 1344 WMIC.exe Token: SeIncBasePriorityPrivilege 1344 WMIC.exe Token: SeCreatePagefilePrivilege 1344 WMIC.exe Token: SeBackupPrivilege 1344 WMIC.exe Token: SeRestorePrivilege 1344 WMIC.exe Token: SeShutdownPrivilege 1344 WMIC.exe Token: SeDebugPrivilege 1344 WMIC.exe Token: SeSystemEnvironmentPrivilege 1344 WMIC.exe Token: SeRemoteShutdownPrivilege 1344 WMIC.exe Token: SeUndockPrivilege 1344 WMIC.exe Token: SeManageVolumePrivilege 1344 WMIC.exe Token: 33 1344 WMIC.exe Token: 34 1344 WMIC.exe Token: 35 1344 WMIC.exe Token: SeIncreaseQuotaPrivilege 1344 WMIC.exe Token: SeSecurityPrivilege 1344 WMIC.exe Token: SeTakeOwnershipPrivilege 1344 WMIC.exe Token: SeLoadDriverPrivilege 1344 WMIC.exe Token: SeSystemProfilePrivilege 1344 WMIC.exe Token: SeSystemtimePrivilege 1344 WMIC.exe Token: SeProfSingleProcessPrivilege 1344 WMIC.exe Token: SeIncBasePriorityPrivilege 1344 WMIC.exe Token: SeCreatePagefilePrivilege 1344 WMIC.exe Token: SeBackupPrivilege 1344 WMIC.exe Token: SeRestorePrivilege 1344 WMIC.exe Token: SeShutdownPrivilege 1344 WMIC.exe Token: SeDebugPrivilege 1344 WMIC.exe Token: SeSystemEnvironmentPrivilege 1344 WMIC.exe Token: SeRemoteShutdownPrivilege 1344 WMIC.exe Token: SeUndockPrivilege 1344 WMIC.exe Token: SeManageVolumePrivilege 1344 WMIC.exe Token: 33 1344 WMIC.exe Token: 34 1344 WMIC.exe Token: 35 1344 WMIC.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2036 1704 이력서(엑셀버전).exe 27 PID 1704 wrote to memory of 2004 1704 이력서(엑셀버전).exe 28 PID 1704 wrote to memory of 2004 1704 이력서(엑셀버전).exe 28 PID 1704 wrote to memory of 2004 1704 이력서(엑셀버전).exe 28 PID 1704 wrote to memory of 2004 1704 이력서(엑셀버전).exe 28 PID 2036 wrote to memory of 1980 2036 이력서(엑셀버전).exe 30 PID 2036 wrote to memory of 1980 2036 이력서(엑셀버전).exe 30 PID 2036 wrote to memory of 1980 2036 이력서(엑셀버전).exe 30 PID 2036 wrote to memory of 1980 2036 이력서(엑셀버전).exe 30 PID 1980 wrote to memory of 1116 1980 cmd.exe 32 PID 1980 wrote to memory of 1116 1980 cmd.exe 32 PID 1980 wrote to memory of 1116 1980 cmd.exe 32 PID 1980 wrote to memory of 996 1980 cmd.exe 35 PID 1980 wrote to memory of 996 1980 cmd.exe 35 PID 1980 wrote to memory of 996 1980 cmd.exe 35 PID 1980 wrote to memory of 1344 1980 cmd.exe 39 PID 1980 wrote to memory of 1344 1980 cmd.exe 39 PID 1980 wrote to memory of 1344 1980 cmd.exe 39 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1604 1996 이력서(엑셀버전).exe 41 PID 1996 wrote to memory of 1904 1996 이력서(엑셀버전).exe 42 PID 1996 wrote to memory of 1904 1996 이력서(엑셀버전).exe 42 PID 1996 wrote to memory of 1904 1996 이력서(엑셀버전).exe 42 PID 1996 wrote to memory of 1904 1996 이력서(엑셀버전).exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exe"C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exeﮅ2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exe"C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exe" n20363⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\이력서(엑셀버전).exeﮅ4⤵PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 3964⤵
- Program crash
PID:1904
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1116
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:996
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 4842⤵
- Program crash
PID:2004
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1336
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541.9MB
MD5bbf76acfd11f3816fd59caa99080fae5
SHA160f4929a845fccf7f5c3210f57153ec9be762ee9
SHA256eecca479dcd255cf3bda5805ee1c4fd41629c52150e3058aee862d3b593036cc
SHA5122518f1822e1d2e421e6a5392495451cde23b816d11534703348ccf808580eb188f1499e798fbd415adc5e2cc16c37ef75ba290901c4c33334809905271740c9a
-
Filesize
541.9MB
MD57c67bec3f72d0f4747039a7f800f1d1c
SHA19bae791481ea6997595eddb35dce507e84828732
SHA256f33a4ad03fe80ffabb1c0c0d9fa640c4a7c166a05e5fd06dd130d10b50016dd9
SHA512470a9db9b53a0d34493b3eeca48674e2bcff704689844d93e878536d3536da64f84fb5cceac1dc59983aaf5d52d3378e2c559e120d1fa82a4123168b431613ec
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88