Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 17:25
Behavioral task
behavioral1
Sample
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe
-
Size
41KB
-
MD5
2ca5161644f3e3c58b7f7832efd583c0
-
SHA1
5ce6370d62e04fb1db0431f78e385e374f2a9e3f
-
SHA256
b506600868e623e54f988caa04fd6d1973947b836e239c64bb8d1952dd76481a
-
SHA512
e9b6874c4a1958b1ed96b24d5cbba376a887a539dde464a37191cf14831220a39854054ce78954deab5b9dcd32198c404b9e9ff7e8cbb5c9db64a10ddc942a78
-
SSDEEP
768:jL+ntTLPgn3CI1uGukUcjI2Hp9xG6e7j6oERZVvrd7SRBl+Lkl+XkvDcYg17TIO8:jwtTLESI1RUcdJ861s0ccZ17TI1
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Makop family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8304) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2812 wbadmin.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
flow ioc 27 iplogger.org 32 iplogger.org 4 iplogger.org 8 iplogger.org 10 iplogger.org 12 iplogger.org 30 iplogger.org 31 iplogger.org 33 iplogger.org 25 iplogger.org 26 iplogger.org 29 iplogger.org 9 iplogger.org 11 iplogger.org 22 iplogger.org 23 iplogger.org 5 iplogger.org 21 iplogger.org 24 iplogger.org 28 iplogger.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeslm.dat 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\localizedStrings.js 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00095_.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FEZIP.POC 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_TexturedBlue.gif 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.nl_ja_4.4.0.v20140623020002.jar 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\AST4ADT 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02053J.JPG 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RECS.ICO 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_zh_CN.jar 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_schemas14.xss 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGNAVBAR.XML 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.XML 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195534.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.HXS 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\clock.css 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\Solitaire.exe.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\mpvis.dll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VeriSign_Class_3_Code_Signing_2001-4_CA.cer 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\clock.css 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\GlobeButtonImage.jpg 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\WMPMediaSharing.dll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\gadget.xml 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\Tulip.jpg 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0089945.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART14.BDR 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRM.XML 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL044.XML 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSWORD.OLB 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POST98SP.POC 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\TableTextService.dll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.RSA 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Reykjavik 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_F_COL.HXK 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_travel_Thumbnail.bmp 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_h.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-down.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\MSPVWCTL.DLL.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02028K.JPG 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107484.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmticmlr.h 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_s.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.RSD 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00527_.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson_Creek 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_ja.jar 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00792_.WMF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15034_.GIF 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\LASER.WAV 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT632.CNV 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\MSTTSLoc.dll.mui 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2496 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2280 vssvc.exe Token: SeRestorePrivilege 2280 vssvc.exe Token: SeAuditPrivilege 2280 vssvc.exe Token: SeBackupPrivilege 2832 wbengine.exe Token: SeRestorePrivilege 2832 wbengine.exe Token: SeSecurityPrivilege 2832 wbengine.exe Token: SeIncreaseQuotaPrivilege 2744 WMIC.exe Token: SeSecurityPrivilege 2744 WMIC.exe Token: SeTakeOwnershipPrivilege 2744 WMIC.exe Token: SeLoadDriverPrivilege 2744 WMIC.exe Token: SeSystemProfilePrivilege 2744 WMIC.exe Token: SeSystemtimePrivilege 2744 WMIC.exe Token: SeProfSingleProcessPrivilege 2744 WMIC.exe Token: SeIncBasePriorityPrivilege 2744 WMIC.exe Token: SeCreatePagefilePrivilege 2744 WMIC.exe Token: SeBackupPrivilege 2744 WMIC.exe Token: SeRestorePrivilege 2744 WMIC.exe Token: SeShutdownPrivilege 2744 WMIC.exe Token: SeDebugPrivilege 2744 WMIC.exe Token: SeSystemEnvironmentPrivilege 2744 WMIC.exe Token: SeRemoteShutdownPrivilege 2744 WMIC.exe Token: SeUndockPrivilege 2744 WMIC.exe Token: SeManageVolumePrivilege 2744 WMIC.exe Token: 33 2744 WMIC.exe Token: 34 2744 WMIC.exe Token: 35 2744 WMIC.exe Token: SeIncreaseQuotaPrivilege 2744 WMIC.exe Token: SeSecurityPrivilege 2744 WMIC.exe Token: SeTakeOwnershipPrivilege 2744 WMIC.exe Token: SeLoadDriverPrivilege 2744 WMIC.exe Token: SeSystemProfilePrivilege 2744 WMIC.exe Token: SeSystemtimePrivilege 2744 WMIC.exe Token: SeProfSingleProcessPrivilege 2744 WMIC.exe Token: SeIncBasePriorityPrivilege 2744 WMIC.exe Token: SeCreatePagefilePrivilege 2744 WMIC.exe Token: SeBackupPrivilege 2744 WMIC.exe Token: SeRestorePrivilege 2744 WMIC.exe Token: SeShutdownPrivilege 2744 WMIC.exe Token: SeDebugPrivilege 2744 WMIC.exe Token: SeSystemEnvironmentPrivilege 2744 WMIC.exe Token: SeRemoteShutdownPrivilege 2744 WMIC.exe Token: SeUndockPrivilege 2744 WMIC.exe Token: SeManageVolumePrivilege 2744 WMIC.exe Token: 33 2744 WMIC.exe Token: 34 2744 WMIC.exe Token: 35 2744 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2608 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 30 PID 848 wrote to memory of 2608 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 30 PID 848 wrote to memory of 2608 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 30 PID 848 wrote to memory of 2608 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 30 PID 2608 wrote to memory of 2496 2608 cmd.exe 32 PID 2608 wrote to memory of 2496 2608 cmd.exe 32 PID 2608 wrote to memory of 2496 2608 cmd.exe 32 PID 2608 wrote to memory of 2812 2608 cmd.exe 36 PID 2608 wrote to memory of 2812 2608 cmd.exe 36 PID 2608 wrote to memory of 2812 2608 cmd.exe 36 PID 2608 wrote to memory of 2744 2608 cmd.exe 40 PID 2608 wrote to memory of 2744 2608 cmd.exe 40 PID 2608 wrote to memory of 2744 2608 cmd.exe 40 PID 848 wrote to memory of 556 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 43 PID 848 wrote to memory of 556 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 43 PID 848 wrote to memory of 556 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 43 PID 848 wrote to memory of 556 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 43 PID 848 wrote to memory of 2776 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 45 PID 848 wrote to memory of 2776 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 45 PID 848 wrote to memory of 2776 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 45 PID 848 wrote to memory of 2776 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 45 PID 848 wrote to memory of 2936 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 46 PID 848 wrote to memory of 2936 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 46 PID 848 wrote to memory of 2936 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 46 PID 848 wrote to memory of 2936 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 46 PID 848 wrote to memory of 2956 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 47 PID 848 wrote to memory of 2956 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 47 PID 848 wrote to memory of 2956 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 47 PID 848 wrote to memory of 2956 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 47 PID 848 wrote to memory of 2224 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 48 PID 848 wrote to memory of 2224 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 48 PID 848 wrote to memory of 2224 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 48 PID 848 wrote to memory of 2224 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 48 PID 848 wrote to memory of 2728 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 49 PID 848 wrote to memory of 2728 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 49 PID 848 wrote to memory of 2728 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 49 PID 848 wrote to memory of 2728 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 49 PID 848 wrote to memory of 1844 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 50 PID 848 wrote to memory of 1844 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 50 PID 848 wrote to memory of 1844 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 50 PID 848 wrote to memory of 1844 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 50 PID 848 wrote to memory of 2032 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 51 PID 848 wrote to memory of 2032 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 51 PID 848 wrote to memory of 2032 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 51 PID 848 wrote to memory of 2032 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 51 PID 848 wrote to memory of 2564 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 52 PID 848 wrote to memory of 2564 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 52 PID 848 wrote to memory of 2564 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 52 PID 848 wrote to memory of 2564 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 52 PID 848 wrote to memory of 2516 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 53 PID 848 wrote to memory of 2516 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 53 PID 848 wrote to memory of 2516 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 53 PID 848 wrote to memory of 2516 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 53 PID 848 wrote to memory of 1916 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 54 PID 848 wrote to memory of 1916 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 54 PID 848 wrote to memory of 1916 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 54 PID 848 wrote to memory of 1916 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 54 PID 848 wrote to memory of 2044 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 55 PID 848 wrote to memory of 2044 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 55 PID 848 wrote to memory of 2044 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 55 PID 848 wrote to memory of 2044 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 55 PID 848 wrote to memory of 2576 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 56 PID 848 wrote to memory of 2576 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 56 PID 848 wrote to memory of 2576 848 2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2496
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2812
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1128
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:864
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD578cad4f3a0825e459920cdf1031634f8
SHA13ad38d81abc1e981fdf3f349994dbbdd47aba39e
SHA25644c45489ca5646f8995af475331248267833d9b4ab77af2131419525c3af1f27
SHA512cf000d3c497878b007de5bb79ece513cd75fef2710dd8b2e6cb42ab2fc8639c81f37603b42ba75974c351530ea2ebd7b90866e7958ddcaa1c37781a733524d43