Behavioral task
behavioral1
Sample
2024-10-02_29df096d37993e1f6ac7071cb84617ee_makop.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-02_29df096d37993e1f6ac7071cb84617ee_makop.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_29df096d37993e1f6ac7071cb84617ee_makop
-
Size
54KB
-
MD5
29df096d37993e1f6ac7071cb84617ee
-
SHA1
3296fa956f71468813b341cc45b44e7c749f9266
-
SHA256
d66bfeb539f4b6f81d0610a128d8a7ebbf559b37df226c5c8b3e04d64c37be0d
-
SHA512
7dffa0f513c8bea2c3fc6d025656e6b04991440f03236c2bf101982fa985b482bc6304fe123c04e029183bacd65a376d293afd84d90c112a0a2d8cd6ec6c76c2
-
SSDEEP
768:2yN4rOjnmQjHeWi0SToS8W9A0WohKTz42vH+Z5ykBNyJaoykY4DuY3zqlrKKMVkq:2cnmQj60IANoaz+Z5ykB+YmX3zHf5f
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
Processes:
resource yara_rule sample family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-10-02_29df096d37993e1f6ac7071cb84617ee_makop
Files
-
2024-10-02_29df096d37993e1f6ac7071cb84617ee_makop.exe windows:4 windows x86 arch:x86
a642f54ffcefd9f345f0329727835601
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCloseEnum
WNetOpenEnumW
WNetEnumResourceW
kernel32
ReadFile
CreateFileW
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
GetVersion
TerminateThread
PeekNamedPipe
GetProcAddress
LoadLibraryA
GetComputerNameW
SetEvent
CreateEventW
SetFilePointerEx
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
CreatePipe
LocalFree
GetCommandLineW
GetEnvironmentVariableW
CreateProcessW
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
GetSystemWindowsDirectoryW
CreateToolhelp32Snapshot
SetHandleInformation
GetTempPathW
GetTempFileNameW
CreateDirectoryW
GetStdHandle
WriteFile
Sleep
TryEnterCriticalSection
FindClose
GetLastError
GetFileAttributesW
GetLogicalDrives
WaitForSingleObject
CreateThread
GetVolumeInformationW
SetErrorMode
FindNextFileW
GetDriveTypeW
WaitForMultipleObjects
FindFirstFileW
TerminateProcess
DeleteCriticalSection
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
CloseHandle
OpenProcess
user32
EndDialog
KillTimer
ShowWindow
wsprintfA
MessageBoxW
SetWindowTextA
SendMessageW
EnableWindow
PostMessageW
GetDC
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
SetClipboardData
RegisterHotKey
DialogBoxParamW
GetShellWindow
GetWindowThreadProcessId
ReleaseDC
UnregisterHotKey
SystemParametersInfoW
wsprintfW
DrawTextA
SetTimer
OpenClipboard
gdi32
GetObjectW
SetTextColor
DeleteDC
GetDeviceCaps
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SetBkMode
CreateFontW
DeleteObject
GetDIBits
advapi32
CryptImportKey
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
DuplicateTokenEx
SetTokenInformation
GetTokenInformation
OpenProcessToken
CryptDecrypt
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptEncrypt
CryptDestroyKey
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
netapi32
NetApiBufferFree
NetGetJoinInformation
msimg32
GradientFill
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ