Behavioral task
behavioral1
Sample
fe52d906fa596e7ae16633074ff7178b3ac40e26a93f0009f1b33d5cbf219e91_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe52d906fa596e7ae16633074ff7178b3ac40e26a93f0009f1b33d5cbf219e91_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
fe52d906fa596e7ae16633074ff7178b3ac40e26a93f0009f1b33d5cbf219e91_unpacked.exe
-
Size
33KB
-
MD5
8946520970ac0d53437e0600b6ae4574
-
SHA1
90e0babf5ce77be1769fe055a5b17abf75c851ce
-
SHA256
fe52d906fa596e7ae16633074ff7178b3ac40e26a93f0009f1b33d5cbf219e91
-
SHA512
2e39fc6bd48e909fc3b15b9df78c2c973d970ed88eeec7d25bbffddf1ba78fd1dbe66acb87d61d1e9e62487ae263d747227c381e26c96a7f5f03d2694f8e6612
-
SSDEEP
768:ww5O0IM6q/LXdXiejtmkXJtyB3Igi6HnD6mCu7C4Pyf:LItq/xzZdDMBCCyf
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
Files
-
fe52d906fa596e7ae16633074ff7178b3ac40e26a93f0009f1b33d5cbf219e91_unpacked.exe.exe windows x86
20500986b8c25c516b9b2ff4a1e733cf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
GetVolumeInformationW
CreateThread
ExitProcess
GetModuleHandleW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringA
DeleteCriticalSection
TryEnterCriticalSection
CreateDirectoryW
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
CloseHandle
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
PeekNamedPipe
TerminateThread
TerminateProcess
GetTickCount
GetProcAddress
GetModuleHandleA
GetCommandLineW
OpenProcess
GetModuleFileNameW
CreatePipe
GetEnvironmentVariableW
FindNextFileW
GetSystemWindowsDirectoryW
SetHandleInformation
GetExitCodeProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetVersion
WaitForMultipleObjects
DeviceIoControl
FindClose
GetLastError
CreateFileW
GetLogicalDrives
WaitForSingleObject
SetErrorMode
GetDriveTypeW
FindFirstFileW
HeapAlloc
CreateProcessW
user32
GetWindowThreadProcessId
wsprintfA
EndDialog
ShowWindow
MessageBoxW
SetWindowTextA
EnableWindow
UnregisterHotKey
GetShellWindow
RegisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
DialogBoxParamW
SetTimer
PostMessageW
SetWindowTextW
KillTimer
advapi32
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptImportKey
CryptEncrypt
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ