Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
03-08-2022 09:00
Behavioral task
behavioral1
Sample
mkp_nowin.exe
Resource
win7-20220718-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
mkp_nowin.exe
Resource
win10v2004-20220722-en
14 signatures
150 seconds
General
-
Target
mkp_nowin.exe
-
Size
42KB
-
MD5
d0fc0f9ec95cecf3550cdc3fb46e2f9e
-
SHA1
849470ba2fed3d2d153364e951bf2c7ce29a0210
-
SHA256
bc23e3f90365b07b0477de81b377006c5cc3ecdded9bf80f5e363489924435dd
-
SHA512
dbc1465a65abd0504271ea246c8509c8ae8fab203d0d272d8a95b086515566a7421235b71f6215e391e6df9a59f40f16f804bbe89315bd216b47424bf067bbcb
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\AppData\Local\Temp\2887110549\+README-WARNING+.txt
Ransom Note
::: Greetings :::
Little FAQ:
.1.
Q: Whats Happen?
A: Your files have been encrypted. The file structure was not damaged, we did everything possible so that this could not happen.
.2.
Q: How to recover files?
A: If you wish to decrypt your files you will need to pay us.
.3.
Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.
.4.
Q: How to contact with you?
A: You can write us to our mailbox: [email protected]
.5.
Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.
.6.
Q: If I don�t want to pay bad people like you?
A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money.
:::BEWARE:::
DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.
Emails
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1900 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\fur.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipRes.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\History.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tabskb.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkWatson.exe.mui mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt mkp_nowin.exe File created C:\Program Files\7-Zip\+README-WARNING+.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IPSEventLogMsg.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IpsMigrationPlugin.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatlm.dat mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt mkp_nowin.exe File created C:\Program Files\7-Zip\Lang\+README-WARNING+.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui mkp_nowin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml mkp_nowin.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt mkp_nowin.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1940 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 960 mkp_nowin.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1568 vssvc.exe Token: SeRestorePrivilege 1568 vssvc.exe Token: SeAuditPrivilege 1568 vssvc.exe Token: SeBackupPrivilege 1592 wbengine.exe Token: SeRestorePrivilege 1592 wbengine.exe Token: SeSecurityPrivilege 1592 wbengine.exe Token: SeIncreaseQuotaPrivilege 1856 WMIC.exe Token: SeSecurityPrivilege 1856 WMIC.exe Token: SeTakeOwnershipPrivilege 1856 WMIC.exe Token: SeLoadDriverPrivilege 1856 WMIC.exe Token: SeSystemProfilePrivilege 1856 WMIC.exe Token: SeSystemtimePrivilege 1856 WMIC.exe Token: SeProfSingleProcessPrivilege 1856 WMIC.exe Token: SeIncBasePriorityPrivilege 1856 WMIC.exe Token: SeCreatePagefilePrivilege 1856 WMIC.exe Token: SeBackupPrivilege 1856 WMIC.exe Token: SeRestorePrivilege 1856 WMIC.exe Token: SeShutdownPrivilege 1856 WMIC.exe Token: SeDebugPrivilege 1856 WMIC.exe Token: SeSystemEnvironmentPrivilege 1856 WMIC.exe Token: SeRemoteShutdownPrivilege 1856 WMIC.exe Token: SeUndockPrivilege 1856 WMIC.exe Token: SeManageVolumePrivilege 1856 WMIC.exe Token: 33 1856 WMIC.exe Token: 34 1856 WMIC.exe Token: 35 1856 WMIC.exe Token: SeIncreaseQuotaPrivilege 1856 WMIC.exe Token: SeSecurityPrivilege 1856 WMIC.exe Token: SeTakeOwnershipPrivilege 1856 WMIC.exe Token: SeLoadDriverPrivilege 1856 WMIC.exe Token: SeSystemProfilePrivilege 1856 WMIC.exe Token: SeSystemtimePrivilege 1856 WMIC.exe Token: SeProfSingleProcessPrivilege 1856 WMIC.exe Token: SeIncBasePriorityPrivilege 1856 WMIC.exe Token: SeCreatePagefilePrivilege 1856 WMIC.exe Token: SeBackupPrivilege 1856 WMIC.exe Token: SeRestorePrivilege 1856 WMIC.exe Token: SeShutdownPrivilege 1856 WMIC.exe Token: SeDebugPrivilege 1856 WMIC.exe Token: SeSystemEnvironmentPrivilege 1856 WMIC.exe Token: SeRemoteShutdownPrivilege 1856 WMIC.exe Token: SeUndockPrivilege 1856 WMIC.exe Token: SeManageVolumePrivilege 1856 WMIC.exe Token: 33 1856 WMIC.exe Token: 34 1856 WMIC.exe Token: 35 1856 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 960 wrote to memory of 1992 960 mkp_nowin.exe 27 PID 960 wrote to memory of 1992 960 mkp_nowin.exe 27 PID 960 wrote to memory of 1992 960 mkp_nowin.exe 27 PID 960 wrote to memory of 1992 960 mkp_nowin.exe 27 PID 1992 wrote to memory of 1940 1992 cmd.exe 29 PID 1992 wrote to memory of 1940 1992 cmd.exe 29 PID 1992 wrote to memory of 1940 1992 cmd.exe 29 PID 1992 wrote to memory of 1900 1992 cmd.exe 32 PID 1992 wrote to memory of 1900 1992 cmd.exe 32 PID 1992 wrote to memory of 1900 1992 cmd.exe 32 PID 1992 wrote to memory of 1856 1992 cmd.exe 36 PID 1992 wrote to memory of 1856 1992 cmd.exe 36 PID 1992 wrote to memory of 1856 1992 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\mkp_nowin.exe"C:\Users\Admin\AppData\Local\Temp\mkp_nowin.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\mkp_nowin.exe"C:\Users\Admin\AppData\Local\Temp\mkp_nowin.exe" n9602⤵PID:1944
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1940
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:1900
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1300
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:384