Analysis
-
max time kernel
64s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-12-2022 14:58
Behavioral task
behavioral1
Sample
267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe
Resource
win10v2004-20220812-en
General
-
Target
267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe
-
Size
34KB
-
MD5
fc5456389ec7e0142df678aadde7fdb5
-
SHA1
833f4e36b4adbe00d06a846d1035585ec269a078
-
SHA256
267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97
-
SHA512
40cd72a52fae2b5db6bb7814cf910adbf4497b7a0ec36c313eae6d5406633ab5d3907d0e24560a759f947450a487747c6d7d9f3607c2234135cad770ed8e1407
-
SSDEEP
768:sNOkmJUpM2VA1dvLALUt2UBQNHXWYNZQluDRkOwT3OKFANi:sBmJ0VA1JA9ouZNZJRUOKFB
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 836 wbadmin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143745.GIF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Trek.xml 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Premium.gif 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.INF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\readme-warning.txt 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03379I.JPG 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\setup.swf 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-impl_ja.jar 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341554.JPG 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EST 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\readme-warning.txt 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292272.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kuching 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14711_.GIF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME25.CSS 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107290.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152892.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21302_.GIF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\icon.png 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmplayer.exe.mui 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\GREEK.TXT 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\settings.html 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\settings.css 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153047.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199755.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_ja_4.4.0.v20140623020002.jar 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00068_.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider_right.png 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\cpu.html 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\picturePuzzle.html 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\slideShow.js 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui_5.5.0.165303.jar 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Aspect.xml 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_right.gif 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105410.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierWindowMaskRTL.bmp 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152556.WMF 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME48.CSS 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART10.BDR 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\chkrzm.exe.mui 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\jnwmon.dll.mui 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rssBackBlue_Undocked.png 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\PASSWORD.JPG 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\VeriSignLogo.jpg 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\readme-warning.txt 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\msaccess.exe.manifest 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvmstat.xml 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1252.TXT 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382942.JPG 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\readme-warning.txt 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Wrinkled_Paper.gif 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Whitehorse 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CENTEURO.TXT.[BEC53C2E].[[email protected]].makop 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\CANYON.ELM 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\10.png 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1764 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1440 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1276 vssvc.exe Token: SeRestorePrivilege 1276 vssvc.exe Token: SeAuditPrivilege 1276 vssvc.exe Token: SeBackupPrivilege 1848 wbengine.exe Token: SeRestorePrivilege 1848 wbengine.exe Token: SeSecurityPrivilege 1848 wbengine.exe Token: SeIncreaseQuotaPrivilege 1552 WMIC.exe Token: SeSecurityPrivilege 1552 WMIC.exe Token: SeTakeOwnershipPrivilege 1552 WMIC.exe Token: SeLoadDriverPrivilege 1552 WMIC.exe Token: SeSystemProfilePrivilege 1552 WMIC.exe Token: SeSystemtimePrivilege 1552 WMIC.exe Token: SeProfSingleProcessPrivilege 1552 WMIC.exe Token: SeIncBasePriorityPrivilege 1552 WMIC.exe Token: SeCreatePagefilePrivilege 1552 WMIC.exe Token: SeBackupPrivilege 1552 WMIC.exe Token: SeRestorePrivilege 1552 WMIC.exe Token: SeShutdownPrivilege 1552 WMIC.exe Token: SeDebugPrivilege 1552 WMIC.exe Token: SeSystemEnvironmentPrivilege 1552 WMIC.exe Token: SeRemoteShutdownPrivilege 1552 WMIC.exe Token: SeUndockPrivilege 1552 WMIC.exe Token: SeManageVolumePrivilege 1552 WMIC.exe Token: 33 1552 WMIC.exe Token: 34 1552 WMIC.exe Token: 35 1552 WMIC.exe Token: SeIncreaseQuotaPrivilege 1552 WMIC.exe Token: SeSecurityPrivilege 1552 WMIC.exe Token: SeTakeOwnershipPrivilege 1552 WMIC.exe Token: SeLoadDriverPrivilege 1552 WMIC.exe Token: SeSystemProfilePrivilege 1552 WMIC.exe Token: SeSystemtimePrivilege 1552 WMIC.exe Token: SeProfSingleProcessPrivilege 1552 WMIC.exe Token: SeIncBasePriorityPrivilege 1552 WMIC.exe Token: SeCreatePagefilePrivilege 1552 WMIC.exe Token: SeBackupPrivilege 1552 WMIC.exe Token: SeRestorePrivilege 1552 WMIC.exe Token: SeShutdownPrivilege 1552 WMIC.exe Token: SeDebugPrivilege 1552 WMIC.exe Token: SeSystemEnvironmentPrivilege 1552 WMIC.exe Token: SeRemoteShutdownPrivilege 1552 WMIC.exe Token: SeUndockPrivilege 1552 WMIC.exe Token: SeManageVolumePrivilege 1552 WMIC.exe Token: 33 1552 WMIC.exe Token: 34 1552 WMIC.exe Token: 35 1552 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1920 1440 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe 29 PID 1440 wrote to memory of 1920 1440 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe 29 PID 1440 wrote to memory of 1920 1440 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe 29 PID 1440 wrote to memory of 1920 1440 267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe 29 PID 1920 wrote to memory of 1764 1920 cmd.exe 31 PID 1920 wrote to memory of 1764 1920 cmd.exe 31 PID 1920 wrote to memory of 1764 1920 cmd.exe 31 PID 1920 wrote to memory of 836 1920 cmd.exe 34 PID 1920 wrote to memory of 836 1920 cmd.exe 34 PID 1920 wrote to memory of 836 1920 cmd.exe 34 PID 1920 wrote to memory of 1552 1920 cmd.exe 38 PID 1920 wrote to memory of 1552 1920 cmd.exe 38 PID 1920 wrote to memory of 1552 1920 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe"C:\Users\Admin\AppData\Local\Temp\267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe"C:\Users\Admin\AppData\Local\Temp\267f4251888e56ee84029a34e56fcceb63940f75fa563b20e1a7267806049a97.exe" n14402⤵PID:2020
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1764
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:836
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1748