Resubmissions

28-07-2024 16:38

240728-t5tryssgmm 10

07-07-2024 14:07

240707-rfgd8atekm 10

07-07-2024 14:07

240707-re689awdpe 10

13-09-2022 17:54

220913-wg1lpsgbg7 10

Analysis

  • max time kernel
    1048s
  • max time network
    731s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 14:07

General

  • Target

    RansomwareSamples/MAKOP_27_10_2020_115KB.exe

  • Size

    114KB

  • MD5

    b33e8ce6a7035bee5c5472d5b870b68a

  • SHA1

    783d08fe374f287a4e0412ed8b7f5446c6e65687

  • SHA256

    2b5a3934d3e81fee4654bb1a7288c81af158a6d48a666cf8e379b0492551188f

  • SHA512

    78c36e1f8ba968d55e8b469fba9623bd20f9d7216b4f5983388c32be564484caab228935f96fd8bff82bc8bb8732f7beb9ccede50385b6b6ba7e23b5cc60679f

  • SSDEEP

    3072:Rf1BDZ0kVB67Duw9AMcUTeQnbZ7pgHzL8O1oc8rEUvZfqv8dOWVIc:R9X0GGZpYzL8VcFUvZyUdb

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\readme-warning.txt

Family

makop

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "makop" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: [email protected] or [email protected] .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Signatures

  • Makop

    Ransomware family discovered by @VK_Intel in early 2020.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (8844) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Loads dropped DLL 32 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 32 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
          4⤵
            PID:2208
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\system32\vssadmin.exe
            vssadmin delete shadows /all /quiet
            4⤵
            • Interacts with shadow copies
            PID:2104
          • C:\Windows\system32\wbadmin.exe
            wbadmin delete catalog -quiet
            4⤵
            • Deletes backup catalog
            PID:1344
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1512
        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
          3⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
            4⤵
              PID:2352
          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
            3⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:536
            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
              4⤵
                PID:1452
            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
              3⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                4⤵
                  PID:1580
              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                3⤵
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:2256
                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                  4⤵
                    PID:3008
                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                  3⤵
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:2236
                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                    4⤵
                      PID:1988
                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:580
                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                      4⤵
                        PID:740
                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                      3⤵
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:2432
                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                        4⤵
                          PID:2320
                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                        3⤵
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:2788
                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                          4⤵
                            PID:1036
                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                          3⤵
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:1308
                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                            4⤵
                              PID:1664
                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                            3⤵
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            PID:2552
                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                              4⤵
                                PID:3052
                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                              3⤵
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: MapViewOfSection
                              PID:2268
                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                4⤵
                                  PID:2036
                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                3⤵
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: MapViewOfSection
                                PID:2384
                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                  4⤵
                                    PID:2516
                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                  3⤵
                                  • Loads dropped DLL
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: MapViewOfSection
                                  PID:3064
                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                    4⤵
                                      PID:1644
                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                    3⤵
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: MapViewOfSection
                                    PID:2248
                                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                      4⤵
                                        PID:2632
                                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                      3⤵
                                      • Loads dropped DLL
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: MapViewOfSection
                                      PID:1352
                                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                        4⤵
                                          PID:2724
                                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                        3⤵
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: MapViewOfSection
                                        PID:2932
                                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                          4⤵
                                            PID:2224
                                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                          3⤵
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: MapViewOfSection
                                          PID:1628
                                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                            4⤵
                                              PID:1112
                                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                            3⤵
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: MapViewOfSection
                                            PID:1676
                                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                              4⤵
                                                PID:1264
                                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                              3⤵
                                              • Loads dropped DLL
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: MapViewOfSection
                                              PID:2128
                                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                4⤵
                                                  PID:2668
                                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                3⤵
                                                • Loads dropped DLL
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: MapViewOfSection
                                                PID:2064
                                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                  4⤵
                                                    PID:2708
                                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: MapViewOfSection
                                                  PID:948
                                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                    4⤵
                                                      PID:1936
                                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:2508
                                                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                      4⤵
                                                        PID:1940
                                                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                      3⤵
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: MapViewOfSection
                                                      PID:3068
                                                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                        4⤵
                                                          PID:2672
                                                      • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                        3⤵
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetThreadContext
                                                        • Suspicious behavior: MapViewOfSection
                                                        PID:2836
                                                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                          4⤵
                                                            PID:2596
                                                        • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                          3⤵
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:1160
                                                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                            4⤵
                                                              PID:320
                                                          • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                            3⤵
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:1072
                                                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                              4⤵
                                                                PID:2640
                                                            • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                              3⤵
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious behavior: MapViewOfSection
                                                              PID:732
                                                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                4⤵
                                                                  PID:1784
                                                              • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                3⤵
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:2672
                                                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                  4⤵
                                                                    PID:940
                                                                • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                  3⤵
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: MapViewOfSection
                                                                  PID:2500
                                                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                    4⤵
                                                                      PID:2120
                                                                  • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                    3⤵
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetThreadContext
                                                                    • Suspicious behavior: MapViewOfSection
                                                                    PID:2456
                                                                    • C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\MAKOP_27_10_2020_115KB.exe" n3044
                                                                      4⤵
                                                                        PID:1076
                                                                • C:\Windows\system32\vssvc.exe
                                                                  C:\Windows\system32\vssvc.exe
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2688
                                                                • C:\Windows\system32\wbengine.exe
                                                                  "C:\Windows\system32\wbengine.exe"
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2560
                                                                • C:\Windows\System32\vdsldr.exe
                                                                  C:\Windows\System32\vdsldr.exe -Embedding
                                                                  1⤵
                                                                    PID:2092
                                                                  • C:\Windows\System32\vds.exe
                                                                    C:\Windows\System32\vds.exe
                                                                    1⤵
                                                                      PID:2924

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\readme-warning.txt

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      d171c561e20fc9714f85da3c4331d0b6

                                                                      SHA1

                                                                      8f7e6cd4bda627a0a3d1a0e687c8b998db3b9438

                                                                      SHA256

                                                                      3c829147b1f82f255e4032d2a22d5b83932bc7f74f3540137146530be0353aac

                                                                      SHA512

                                                                      b52823ac0dba9dec6a243d1a3d68718c2a825dae4d6f4f312e92d87ecb87dbb066f259b317628fa588ad1abc4a59e095e5e302e53294bd8b34d414fadc8420c2

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                      Filesize

                                                                      342B

                                                                      MD5

                                                                      6694955ff5b76fd212f58c9d17680e6d

                                                                      SHA1

                                                                      d1e1d8684e6955a20a2b935f4e984557361e62d3

                                                                      SHA256

                                                                      5046882a941913f6d4e3524d1ca826a2df9b8f5a3e131ba48a3a8ba2714000b0

                                                                      SHA512

                                                                      206624a08f00e3efb4ed9991836cc91e33d919ad12f459c5744e6d2cb05718e54d8a4eec19e3595e17179072b6f37ba9f3333039850b111dd6cc17d032f64194

                                                                    • C:\Users\Admin\AppData\Local\Temp\Cab933D.tmp

                                                                      Filesize

                                                                      70KB

                                                                      MD5

                                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                                      SHA1

                                                                      1723be06719828dda65ad804298d0431f6aff976

                                                                      SHA256

                                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                      SHA512

                                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                    • C:\Users\Admin\AppData\Local\Temp\Tar93FB.tmp

                                                                      Filesize

                                                                      181KB

                                                                      MD5

                                                                      4ea6026cf93ec6338144661bf1202cd1

                                                                      SHA1

                                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                      SHA256

                                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                      SHA512

                                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      7b4d566b12cc5c1192c37ac35254782d

                                                                      SHA1

                                                                      774a90a2288dd730ece77929a74bb723ecdf03f5

                                                                      SHA256

                                                                      4802eb84fa2423431345e7988dee8963fcd9cb059d474c17737da27b803e9414

                                                                      SHA512

                                                                      07e718a5170c0ccff64074ee27d101d8d22bfb800f748af566b492cb81691d0e58a65ae74c8764323d6cf7e593b59ccd1e8894ecb762be7317966a1b34118d1c

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      8767d945597825a6a8750bdc41889d4e

                                                                      SHA1

                                                                      8da956305b7557536e2be19f5f77b93cb42e341a

                                                                      SHA256

                                                                      0a41cfde0ae1f02e228533a992ddfdd83ae8acce2602d27ac2e9b43c6234061d

                                                                      SHA512

                                                                      5e4c6a8eac6b50ee7a51cb1717a77a32de81a1936139e61e2a1215bed636c8ac324b5cf289e2ed774863e4e4aa10277f5e8f81e9925e6d9ecaf512f333baa7c8

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      9d078662c0c7bc9570a29a1dcc907772

                                                                      SHA1

                                                                      e7ad61345b32a2bbed851ed027dc344a3f900eb8

                                                                      SHA256

                                                                      05ca1371155694e84e392ed890eeb417a2a9939842d5e1639b91f12e9f218874

                                                                      SHA512

                                                                      421135be2ce771ee5ab56e0e396aa348ee4833e695d6dc4a55e38508b839d548f522176e76a86ac1ae77d6a2af14ee4d1b734e30ceab642f1ee4b3f634e2514a

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      343dba86024a7c5685b673516b189fd9

                                                                      SHA1

                                                                      d77ddeca1c8766dd840536b7cb68f8ed53762200

                                                                      SHA256

                                                                      af67eaaeea997b02c43d7101cb24e7ff0deee375f67dca963df75abc17c18fa4

                                                                      SHA512

                                                                      61c05a37d02ff10626cb2ef71ec084998c333ede5835a482e8aab3f5303bc6cc4130c1362ad8e61988afa2421cbaa1272479ddcbfaaf03645ba20ec3be63da09

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      816d495b7e5c0d318355e0146ddc08a9

                                                                      SHA1

                                                                      0ba4c16632c1a4c0e0cec38022b2f3bedfc4b273

                                                                      SHA256

                                                                      c6f2822f4eda30c56f13f4f98537f9b1e5d7e819eff2462d3a3a5269e6f6c6c7

                                                                      SHA512

                                                                      32ee7acf0687be4a7627f91c9d31f00ce9156b3e77e98d4dc1e9d0a9700eab9d8afdc8b1da2648cfe18105a5df0d7ab2d8a75a860f14c06adbf031923bb84085

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      eebc8ff8242003129fa52e4d26012372

                                                                      SHA1

                                                                      39c1551a8cc5d93b7bc18289f07a1bba7b03b865

                                                                      SHA256

                                                                      1e2271ef79e339bfd97254b42aba62c5d0d916f73156a158544d28baa45052ba

                                                                      SHA512

                                                                      84ebaa25fb5c54689ddfb65c8e3a3a41d7737fb0776304b8fd8f77386a8c8727b075b82cfe0b8ef1f5a8e32e1b0d97cf73cf951814b8087e0dd54aa5ee929480

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      ad160a5b2f857b14ede113cef4513a63

                                                                      SHA1

                                                                      17748e62cb0e31b7563f28a0e7884a6a66a4bc93

                                                                      SHA256

                                                                      64562c817fcfd5868e0991dd4d646b768d6b6e289cd9732d77f6ec9fad999bc3

                                                                      SHA512

                                                                      d9e72daed7b329e37113be00d0132f99f13c1a2f9ad91f9797b03b135c13c75badb9f71ae83b8e7c944a26afdb46545383f46d97b2acc64bd58fb5de341803cc

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      fc5321153d5eb9333162f7b63b30fdcb

                                                                      SHA1

                                                                      665efc33d9022df54243ee4a1a3d41ea237eb344

                                                                      SHA256

                                                                      96a2cc453277b39cdc95590d2553b12c9d4eba04d146ec9c533a85469b8d653e

                                                                      SHA512

                                                                      2ab4903a4cce465464bd1b8145b9cb7e9b7d035ce7e7571c11fbe44ec699c50bef0c0f109adace8689b43f80a217152ef68d730e0469dabca9c5f4761ee4d9c3

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      0da7f55575a06ba7feda9c2b9a234d1e

                                                                      SHA1

                                                                      40f2be05f14e3c8603064bd69a6579517ea0c41f

                                                                      SHA256

                                                                      08eea8db18e25fce8d964eebbd94911b095a39536627ff954d96fde62e80767d

                                                                      SHA512

                                                                      d92f799da09fa6a445c17eee985e70eca5b04863217d478a8e2bdfb6fcb723274d76e3137a67886ffad39246305b5d4e6011f3ce4d11a0c4530db3c892cd2536

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      bc6d661c6da0ba1aa8b185fd965da163

                                                                      SHA1

                                                                      b987b508c3e7bf314f9bcff8fc3996bb6dbba330

                                                                      SHA256

                                                                      534c0e73c43f4c51f4857ff7ddb3e96267a16f01c29dd6e48ff1b1f046eb4534

                                                                      SHA512

                                                                      ef54947c5ab251d2d8900b429714b803fc2a2b4524eff61fdedd17c8e94d661a652dc44eb833465d693c2e67eb5e34ea34780b4bf2e0796da4b14ae36df8d024

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      94ffcd56b5307145fe1ba900102afc31

                                                                      SHA1

                                                                      62723a0b066aa7f01d5f70decc606c02505dc32d

                                                                      SHA256

                                                                      402a0856e03c0c80aacfba94d2674ff25938d91266e81e58c2f8dff5ac06b4b1

                                                                      SHA512

                                                                      97a50944ec7dd3c12a19bc075cff2d56f02ac08ae852c30fd7ff81d9b8a03c53a1db2b0cf8b14d28df9d8cf3730f3871467c1005549dd41c3cb805008863a1c3

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      6c312a1346aa7d4cb946d906cfcc411b

                                                                      SHA1

                                                                      30c140e81d2ed151e3ecb2bb6cb19f27d0d8eb04

                                                                      SHA256

                                                                      6e460f490731df4989644ff18071bba5abad902dafff2a78aef3afe8e49cb001

                                                                      SHA512

                                                                      d11dc62cf9448b20e881c43441e630ae406caac02b172ffaa04ab28efdda688f2102f0ca56fe63e77bbb19ea42120ee6f921d1f3340f0f3bb3ee3f7536897178

                                                                    • C:\Users\Admin\AppData\Roaming\779389082

                                                                      Filesize

                                                                      56KB

                                                                      MD5

                                                                      40b7f298d30296864906d4e175ff9f43

                                                                      SHA1

                                                                      349b60915d0ce78aacc57231ae1e0df151e20087

                                                                      SHA256

                                                                      2448a49c12e2c959a2f88d179c346a4d753725578a4755c8f8f487b1048fdcd4

                                                                      SHA512

                                                                      ed4c76fa8e4e0eb527f34ea6a25094ee8bdc343be1c0806bcb8baff3cd77e6944cee50125090a7fd8869951b53ced7dce4a48a197859a1e4616c7495390b36e7

                                                                    • \Users\Admin\AppData\Local\Temp\nsz31AC.tmp\System.dll

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      fccff8cb7a1067e23fd2e2b63971a8e1

                                                                      SHA1

                                                                      30e2a9e137c1223a78a0f7b0bf96a1c361976d91

                                                                      SHA256

                                                                      6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e

                                                                      SHA512

                                                                      f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

                                                                    • memory/1452-19031-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/1452-19032-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/1452-19033-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2208-8886-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2208-8885-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2208-7399-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2352-18989-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2352-18991-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2352-18990-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-18938-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-1203-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-26-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-16-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-10-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-9-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/3044-7-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                      Filesize

                                                                      124KB