Analysis
-
max time kernel
166s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 18:05
Behavioral task
behavioral1
Sample
6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe
Resource
win10v2004-20220812-en
General
-
Target
6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe
-
Size
36KB
-
MD5
f2ee5fac443bc271ea8dffc4759ad104
-
SHA1
2e0b54d11a13b114cfd203b1679e251482b67794
-
SHA256
6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a
-
SHA512
4528b0eb86ae1e0b116496fa69fe1901a199a20a8524de60d798717bb7e5caaddc59163a06bf5a7e40455f9f6bf6ef6adbe87ddb9d1022cbafa3c1e908fc9834
-
SSDEEP
768:G9GEnDiAZ6vc4y1xP7jIFpaEuiXLiP6AluDAKCfIQJpxHN:GJnDiAOy1tjVfP6ZArg4pdN
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1692 wbadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe\"" 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090087.WMF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_zh_CN.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Regular.otf 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\Proof.XML 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\readme-warning.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.bidi_0.10.0.v20130327-1442.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\readme-warning.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Common Files\System\it-IT\wab32res.dll.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\javafx.properties 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_ja.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Swift_Current 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\readme-warning.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\readme-warning.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Nome 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\form_responses.gif.[06390B9E].[[email protected]].makop 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\PREVIEW.GIF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00419_.WMF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\203x8subpicture.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\SaveGroup.svgz 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\epl-v10.html 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341561.JPG 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\MANIFEST.MF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-services.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Galapagos 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\Monticello 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.c 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Karachi 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153087.WMF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zurich 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Araguaina 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\00_musicbrainz.luac 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105412.WMF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_zh_4.4.0.v20140623020002.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\readme-warning.txt 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmplayer.exe.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10890_.GIF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\vimeo.luac 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnssui.dll.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.xml 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-util.xml 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.log 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Rio_Branco 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Goose_Bay 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\WATERMAR.ELM 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090781.WMF 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2008 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2020 vssvc.exe Token: SeRestorePrivilege 2020 vssvc.exe Token: SeAuditPrivilege 2020 vssvc.exe Token: SeBackupPrivilege 1180 wbengine.exe Token: SeRestorePrivilege 1180 wbengine.exe Token: SeSecurityPrivilege 1180 wbengine.exe Token: SeIncreaseQuotaPrivilege 1500 WMIC.exe Token: SeSecurityPrivilege 1500 WMIC.exe Token: SeTakeOwnershipPrivilege 1500 WMIC.exe Token: SeLoadDriverPrivilege 1500 WMIC.exe Token: SeSystemProfilePrivilege 1500 WMIC.exe Token: SeSystemtimePrivilege 1500 WMIC.exe Token: SeProfSingleProcessPrivilege 1500 WMIC.exe Token: SeIncBasePriorityPrivilege 1500 WMIC.exe Token: SeCreatePagefilePrivilege 1500 WMIC.exe Token: SeBackupPrivilege 1500 WMIC.exe Token: SeRestorePrivilege 1500 WMIC.exe Token: SeShutdownPrivilege 1500 WMIC.exe Token: SeDebugPrivilege 1500 WMIC.exe Token: SeSystemEnvironmentPrivilege 1500 WMIC.exe Token: SeRemoteShutdownPrivilege 1500 WMIC.exe Token: SeUndockPrivilege 1500 WMIC.exe Token: SeManageVolumePrivilege 1500 WMIC.exe Token: 33 1500 WMIC.exe Token: 34 1500 WMIC.exe Token: 35 1500 WMIC.exe Token: SeIncreaseQuotaPrivilege 1500 WMIC.exe Token: SeSecurityPrivilege 1500 WMIC.exe Token: SeTakeOwnershipPrivilege 1500 WMIC.exe Token: SeLoadDriverPrivilege 1500 WMIC.exe Token: SeSystemProfilePrivilege 1500 WMIC.exe Token: SeSystemtimePrivilege 1500 WMIC.exe Token: SeProfSingleProcessPrivilege 1500 WMIC.exe Token: SeIncBasePriorityPrivilege 1500 WMIC.exe Token: SeCreatePagefilePrivilege 1500 WMIC.exe Token: SeBackupPrivilege 1500 WMIC.exe Token: SeRestorePrivilege 1500 WMIC.exe Token: SeShutdownPrivilege 1500 WMIC.exe Token: SeDebugPrivilege 1500 WMIC.exe Token: SeSystemEnvironmentPrivilege 1500 WMIC.exe Token: SeRemoteShutdownPrivilege 1500 WMIC.exe Token: SeUndockPrivilege 1500 WMIC.exe Token: SeManageVolumePrivilege 1500 WMIC.exe Token: 33 1500 WMIC.exe Token: 34 1500 WMIC.exe Token: 35 1500 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1200 1960 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe 29 PID 1960 wrote to memory of 1200 1960 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe 29 PID 1960 wrote to memory of 1200 1960 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe 29 PID 1960 wrote to memory of 1200 1960 6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe 29 PID 1200 wrote to memory of 2008 1200 cmd.exe 31 PID 1200 wrote to memory of 2008 1200 cmd.exe 31 PID 1200 wrote to memory of 2008 1200 cmd.exe 31 PID 1200 wrote to memory of 1692 1200 cmd.exe 34 PID 1200 wrote to memory of 1692 1200 cmd.exe 34 PID 1200 wrote to memory of 1692 1200 cmd.exe 34 PID 1200 wrote to memory of 1500 1200 cmd.exe 38 PID 1200 wrote to memory of 1500 1200 cmd.exe 38 PID 1200 wrote to memory of 1500 1200 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe"C:\Users\Admin\AppData\Local\Temp\6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe"C:\Users\Admin\AppData\Local\Temp\6a845a5bbfabda4d9a5153444718b0426c9a2cf7f23f9ee87cae34d2c594400a.exe" n19602⤵PID:1784
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2008
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:1692
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1752
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2000