Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766.exe
Resource
win10v2004-20231215-en
General
-
Target
e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766
-
Size
32KB
-
MD5
d513beb2bac27c307c3ac5a5a501dc66
-
SHA1
34adc018f611f65572dafed37518418832aad994
-
SHA256
e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766
-
SHA512
f09569379f22c24cc5d7e169404b85fd01ba93573098c729c84db89900982901c1f88c2cb29a9986490ba72487e3f0f917279672ee18354165fbb9d535c7cf5b
-
SSDEEP
768:C2gQ2nGtvZmI1yK0gEBYsuii6bEarouRwe2oTyoGETDA7vyWD2IpdN:qQh+I14gbm8uR1LAjdfrN
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766
Files
-
e40fbde08891baf1f1ce86d879d02a32d2a007368e65348155a298079e2b8766.exe windows:4 windows x86 arch:x86
f130d061c18cf27e4668f9c82ac7f8dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
DeviceIoControl
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
Sleep
WriteFile
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
FindClose
OpenProcess
GetProcAddress
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetCommandLineW
CreatePipe
GetLastError
CreateProcessW
GetSystemWindowsDirectoryW
SetHandleInformation
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
GetVersion
CreateDirectoryW
GetFileAttributesW
CreateFileW
GetLogicalDrives
WaitForSingleObject
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
GetEnvironmentVariableW
user32
wsprintfW
GetShellWindow
GetWindowThreadProcessId
wsprintfA
advapi32
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptAcquireContextW
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
CryptReleaseContext
CryptSetKeyParam
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE