Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 18:45

General

  • Target

    2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe

  • Size

    41KB

  • MD5

    2ef05873f585d356665f0ea0fd8678ff

  • SHA1

    0be8c14efaf9752d48f8bf34ca5d75a40284967b

  • SHA256

    cb4957ca31c15745b25aaf474f66582daf99a9060a54f31aa5557317ea010684

  • SHA512

    785bbb3090af3f82aa0ff501f761f66e3904ffd6707da39667ce87e0478aa5adcd8c8060e0472e460322a55a037850418beeccd0145b1ec9a04b8bc8cd14c908

  • SSDEEP

    768:5xyl5HeOrgHICm1+Gu5NjY2eX7exwr2QB/9QSNTsryu+BFrForD8tMEWV+:585H7wLm14NtSmQeriBc8twV+

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme-warning.txt

Family

makop

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "CARLOS" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: [email protected] .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Signatures

  • Makop

    Ransomware family discovered by @VK_Intel in early 2020.

  • Makop family
  • Renames multiple (8539) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2228
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
        PID:2172
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:628
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1236
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2176
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2728
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2892
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1784
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1660
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:320
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1908
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2916
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1672
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:448
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2888
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1472
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2540
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2476
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2448
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1856
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2804
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2812
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2628
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1960
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1336
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2236
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1940
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1272
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1576
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:656
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1736
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2884
      • C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n2520
        2⤵
        • System Location Discovery: System Language Discovery
        PID:968
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini

      Filesize

      356B

      MD5

      00844ad37ae6dabd413478e001d499a8

      SHA1

      56ba0ea738b99efe565723e0f1ad80a20d35d7b6

      SHA256

      af97bd3a056ddd80e87dc3d523b82a40bd32eae7803c0d142c0e05bdb115fd54

      SHA512

      5e7981dbccd1e57d0ecd2c2e5ac0202d54fed61ee4cf85743d3f1b7b883bf2e4810128bf2a679a6d41ff59f598e5c0369457c6d589461929278fd9b72a368d38

    • C:\Users\Admin\Desktop\readme-warning.txt

      Filesize

      1KB

      MD5

      5b847e2c729d9b78c10c5a05a7f00e4d

      SHA1

      753c40fe7f8f18159eb9702660773502e7eb564a

      SHA256

      1647ba80119c23da45a2b01d70c8564a062122b9273f94f130379a4bead68435

      SHA512

      e450eff2150d7cec896a46391d51477c57f8cc22b41a66587d56b6d8b3642ea61cc52f85455521a2d8ced28ef284f20caca129eb01da73cf9bb29d902a9f3de0