Behavioral task
behavioral1
Sample
2023-04-14_d8ad1664371e35d12035f530252ec8c4_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-04-14_d8ad1664371e35d12035f530252ec8c4_.exe
Resource
win10v2004-20230220-en
General
-
Target
2023-04-14_d8ad1664371e35d12035f530252ec8c4_
-
Size
41KB
-
MD5
d8ad1664371e35d12035f530252ec8c4
-
SHA1
41f9275d57ff644c8224034de3032cb73990c2ec
-
SHA256
008e4c327875110b96deef1dd8ef65cefa201fef60ca1cbb9ab51b5304e66fe1
-
SHA512
6cf8ce589c0a0331278e758174139196fae33a9b1c3bb8dab578b6f9be1c30cadf5da16163f53ad7f43d8a47e54cd4d0b1434bd09c872c28d08ab36e07d91f6e
-
SSDEEP
768:RL+ntTLPgnsCI1uGukUcjI2Hp9xG6e7j6oERZVvrd7SRBl+Lkl+XkvDyYD+DAfqp:RwtTLE/I1RUcdJ861s0cy4SAyDJbpI
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
Files
-
2023-04-14_d8ad1664371e35d12035f530252ec8c4_.exe windows x86
5afc99ca3a218f4d86b9c8bff5b56ac0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
CreateFileW
GetLastError
FindClose
DeviceIoControl
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
TryEnterCriticalSection
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
GetLogicalDrives
PeekNamedPipe
GetComputerNameW
SetEvent
TerminateThread
GetProcAddress
LoadLibraryA
CreateEventW
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
GetCommandLineW
CreatePipe
GetEnvironmentVariableW
CreateProcessW
GetSystemWindowsDirectoryW
WaitForSingleObject
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateDirectoryW
GetFileAttributesW
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
GetVersion
SetHandleInformation
user32
DialogBoxParamW
ShowWindow
MessageBoxW
SetWindowTextA
SendMessageW
EnableWindow
UnregisterHotKey
GetWindowThreadProcessId
RegisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
GetShellWindow
SetTimer
PostMessageW
KillTimer
wsprintfA
SetWindowTextW
EndDialog
advapi32
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptImportKey
CryptEncrypt
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ