Behavioral task
behavioral1
Sample
2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21.exe
Resource
win10v2004-20240226-en
General
-
Target
33f658a424fa30b55ddddaaf3c738b7e61d4949a777ea8f633fcbcb5fb436580
-
Size
22KB
-
MD5
c118fc46d74d08285ce1b5a3822a5c2f
-
SHA1
d9dbd55763267a49ee8a472753ee27af8f1fa1a9
-
SHA256
33f658a424fa30b55ddddaaf3c738b7e61d4949a777ea8f633fcbcb5fb436580
-
SHA512
daac3aa0197a649973fffdfe5fe6fc26d2c471de6ac412049fb1d133a6018cc571e7d2787d7c640f728ba618b775c684720299589bbd5b03c31796f19e937ecb
-
SSDEEP
384:DHJDXfQn0sy0ASe6KSe3rlbDYM2tJcyl/Ex+gtvy7tz0/1xf/Cxx9KmFteVlq:xQn31e6ReblbL2bZOx+gtvy7Mfn43vFP
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule static1/unpack001/2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21 family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21
Files
-
33f658a424fa30b55ddddaaf3c738b7e61d4949a777ea8f633fcbcb5fb436580.zip
Password: infected
-
2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21.exe windows:4 windows x86 arch:x86
b100baef7c1f36d7b73f84173c7957de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
FindClose
DeviceIoControl
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
Sleep
WriteFile
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GetLastError
GetVersion
GetProcAddress
LoadLibraryA
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
CreateFileW
CreatePipe
GetEnvironmentVariableW
PeekNamedPipe
CreateProcessW
GetSystemWindowsDirectoryW
SetHandleInformation
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
CreateDirectoryW
GetFileAttributesW
GetLogicalDrives
WaitForSingleObject
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
GetCommandLineW
user32
wsprintfW
wsprintfA
GetShellWindow
GetWindowThreadProcessId
advapi32
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptAcquireContextW
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
CryptReleaseContext
CryptSetKeyParam
shell32
ord680
CommandLineToArgvW
SHGetSpecialFolderPathW
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE