Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 17:42
Behavioral task
behavioral1
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
-
Size
47KB
-
MD5
5c48b93df8207e404318b292bfe910d1
-
SHA1
66bb4b52371c32b8015eea3b136816bdb221cd93
-
SHA256
9b0c1a34ff866490ee3db6e61fde2b97173dd95d02ba4fdceeacbe3e9441ee3c
-
SHA512
7a2020a613ec2aaee5332f1485837d55b593b9cc6b2db3db8c7c1e7b37ff496d378c2143d9c47ca7a89d63f7b8b1f5f3cb12d3dcc1668f8697090714ff07e98d
-
SSDEEP
768:YgqXOpw0VIWzh+1mQjPW+yHdykGlsxxGfnk70R6iOw4SbzxClJADVDwkvDx5TSBH:YvOpwmZUmQjCHdmKKR6iuoClJADVDrx6
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Makop family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8349) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 840 wbadmin.exe -
Stops running service(s) 4 TTPs
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 12 iplogger.org 23 iplogger.org 24 iplogger.org 3 iplogger.org 13 iplogger.org 22 iplogger.org 25 iplogger.org 26 iplogger.org 27 iplogger.org 4 iplogger.org 8 iplogger.org 9 iplogger.org 10 iplogger.org 11 iplogger.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341534.JPG 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00910_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00788_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00095_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\Minesweeper.exe.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\F12Tools.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152892.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME51.CSS 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGPUNCT.XML 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\main.css 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLOGO.DPV 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe Root Certificate.cer 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLTASKR.FAE 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_mid.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\vlc.mo 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSansBold.ttf 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\highDpiImageSwap.js 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\stop_collection_data.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099182.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143752.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msadcer.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02071_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232797.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\2 Right.accdt 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\bl.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107026.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\TipBand.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\JOURNAL.ELM 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\HEADER.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\it-IT\OmdProject.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.xml 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_ja_4.4.0.v20140623020002.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_SelectionSubpicture.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-io_zh_CN.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\EDGE.INF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00402_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115864.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_hail.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_cs.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Yellowknife 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_ja.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\ZY______.PFB.[EDF79081-W].[[email protected]].makop 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0186346.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.security.ui_1.1.200.v20130626-2037.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-fallback.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\FAXEXT.ECF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\oracle.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\rtscom.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101863.BMP 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\TAB_ON.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_High.jpg 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Launches sc.exe 62 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2552 sc.exe 892 sc.exe 2556 sc.exe 2376 sc.exe 1164 sc.exe 1548 sc.exe 2128 sc.exe 1336 sc.exe 2020 sc.exe 2964 sc.exe 812 sc.exe 1136 sc.exe 1892 sc.exe 2616 sc.exe 2956 sc.exe 952 sc.exe 2536 sc.exe 2768 sc.exe 2348 sc.exe 1240 sc.exe 1316 sc.exe 3036 sc.exe 2804 sc.exe 2824 sc.exe 2364 sc.exe 3052 sc.exe 1516 sc.exe 884 sc.exe 2920 sc.exe 2752 sc.exe 1828 sc.exe 2948 sc.exe 2512 sc.exe 2172 sc.exe 1772 sc.exe 2344 sc.exe 936 sc.exe 2412 sc.exe 1624 sc.exe 1192 sc.exe 2488 sc.exe 2932 sc.exe 2928 sc.exe 2780 sc.exe 2984 sc.exe 2252 sc.exe 940 sc.exe 2896 sc.exe 320 sc.exe 1644 sc.exe 1012 sc.exe 2828 sc.exe 2884 sc.exe 2476 sc.exe 2044 sc.exe 2924 sc.exe 3032 sc.exe 2096 sc.exe 2792 sc.exe 2800 sc.exe 1060 sc.exe 2040 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 436 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2004 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2468 vssvc.exe Token: SeRestorePrivilege 2468 vssvc.exe Token: SeAuditPrivilege 2468 vssvc.exe Token: SeBackupPrivilege 2324 wbengine.exe Token: SeRestorePrivilege 2324 wbengine.exe Token: SeSecurityPrivilege 2324 wbengine.exe Token: SeIncreaseQuotaPrivilege 2472 WMIC.exe Token: SeSecurityPrivilege 2472 WMIC.exe Token: SeTakeOwnershipPrivilege 2472 WMIC.exe Token: SeLoadDriverPrivilege 2472 WMIC.exe Token: SeSystemProfilePrivilege 2472 WMIC.exe Token: SeSystemtimePrivilege 2472 WMIC.exe Token: SeProfSingleProcessPrivilege 2472 WMIC.exe Token: SeIncBasePriorityPrivilege 2472 WMIC.exe Token: SeCreatePagefilePrivilege 2472 WMIC.exe Token: SeBackupPrivilege 2472 WMIC.exe Token: SeRestorePrivilege 2472 WMIC.exe Token: SeShutdownPrivilege 2472 WMIC.exe Token: SeDebugPrivilege 2472 WMIC.exe Token: SeSystemEnvironmentPrivilege 2472 WMIC.exe Token: SeRemoteShutdownPrivilege 2472 WMIC.exe Token: SeUndockPrivilege 2472 WMIC.exe Token: SeManageVolumePrivilege 2472 WMIC.exe Token: 33 2472 WMIC.exe Token: 34 2472 WMIC.exe Token: 35 2472 WMIC.exe Token: SeIncreaseQuotaPrivilege 2472 WMIC.exe Token: SeSecurityPrivilege 2472 WMIC.exe Token: SeTakeOwnershipPrivilege 2472 WMIC.exe Token: SeLoadDriverPrivilege 2472 WMIC.exe Token: SeSystemProfilePrivilege 2472 WMIC.exe Token: SeSystemtimePrivilege 2472 WMIC.exe Token: SeProfSingleProcessPrivilege 2472 WMIC.exe Token: SeIncBasePriorityPrivilege 2472 WMIC.exe Token: SeCreatePagefilePrivilege 2472 WMIC.exe Token: SeBackupPrivilege 2472 WMIC.exe Token: SeRestorePrivilege 2472 WMIC.exe Token: SeShutdownPrivilege 2472 WMIC.exe Token: SeDebugPrivilege 2472 WMIC.exe Token: SeSystemEnvironmentPrivilege 2472 WMIC.exe Token: SeRemoteShutdownPrivilege 2472 WMIC.exe Token: SeUndockPrivilege 2472 WMIC.exe Token: SeManageVolumePrivilege 2472 WMIC.exe Token: 33 2472 WMIC.exe Token: 34 2472 WMIC.exe Token: 35 2472 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2872 2004 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2004 wrote to memory of 2872 2004 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2004 wrote to memory of 2872 2004 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2004 wrote to memory of 2872 2004 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2872 wrote to memory of 3032 2872 cmd.exe 32 PID 2872 wrote to memory of 3032 2872 cmd.exe 32 PID 2872 wrote to memory of 3032 2872 cmd.exe 32 PID 2872 wrote to memory of 3036 2872 cmd.exe 33 PID 2872 wrote to memory of 3036 2872 cmd.exe 33 PID 2872 wrote to memory of 3036 2872 cmd.exe 33 PID 2872 wrote to memory of 2172 2872 cmd.exe 34 PID 2872 wrote to memory of 2172 2872 cmd.exe 34 PID 2872 wrote to memory of 2172 2872 cmd.exe 34 PID 2872 wrote to memory of 2536 2872 cmd.exe 35 PID 2872 wrote to memory of 2536 2872 cmd.exe 35 PID 2872 wrote to memory of 2536 2872 cmd.exe 35 PID 2872 wrote to memory of 2920 2872 cmd.exe 36 PID 2872 wrote to memory of 2920 2872 cmd.exe 36 PID 2872 wrote to memory of 2920 2872 cmd.exe 36 PID 2872 wrote to memory of 2556 2872 cmd.exe 37 PID 2872 wrote to memory of 2556 2872 cmd.exe 37 PID 2872 wrote to memory of 2556 2872 cmd.exe 37 PID 2872 wrote to memory of 2896 2872 cmd.exe 38 PID 2872 wrote to memory of 2896 2872 cmd.exe 38 PID 2872 wrote to memory of 2896 2872 cmd.exe 38 PID 2872 wrote to memory of 2096 2872 cmd.exe 39 PID 2872 wrote to memory of 2096 2872 cmd.exe 39 PID 2872 wrote to memory of 2096 2872 cmd.exe 39 PID 2872 wrote to memory of 2488 2872 cmd.exe 40 PID 2872 wrote to memory of 2488 2872 cmd.exe 40 PID 2872 wrote to memory of 2488 2872 cmd.exe 40 PID 2872 wrote to memory of 2924 2872 cmd.exe 41 PID 2872 wrote to memory of 2924 2872 cmd.exe 41 PID 2872 wrote to memory of 2924 2872 cmd.exe 41 PID 2872 wrote to memory of 2804 2872 cmd.exe 42 PID 2872 wrote to memory of 2804 2872 cmd.exe 42 PID 2872 wrote to memory of 2804 2872 cmd.exe 42 PID 2872 wrote to memory of 2964 2872 cmd.exe 43 PID 2872 wrote to memory of 2964 2872 cmd.exe 43 PID 2872 wrote to memory of 2964 2872 cmd.exe 43 PID 2872 wrote to memory of 2252 2872 cmd.exe 44 PID 2872 wrote to memory of 2252 2872 cmd.exe 44 PID 2872 wrote to memory of 2252 2872 cmd.exe 44 PID 2872 wrote to memory of 2792 2872 cmd.exe 45 PID 2872 wrote to memory of 2792 2872 cmd.exe 45 PID 2872 wrote to memory of 2792 2872 cmd.exe 45 PID 2872 wrote to memory of 2932 2872 cmd.exe 46 PID 2872 wrote to memory of 2932 2872 cmd.exe 46 PID 2872 wrote to memory of 2932 2872 cmd.exe 46 PID 2872 wrote to memory of 2928 2872 cmd.exe 47 PID 2872 wrote to memory of 2928 2872 cmd.exe 47 PID 2872 wrote to memory of 2928 2872 cmd.exe 47 PID 2872 wrote to memory of 2828 2872 cmd.exe 48 PID 2872 wrote to memory of 2828 2872 cmd.exe 48 PID 2872 wrote to memory of 2828 2872 cmd.exe 48 PID 2872 wrote to memory of 2768 2872 cmd.exe 49 PID 2872 wrote to memory of 2768 2872 cmd.exe 49 PID 2872 wrote to memory of 2768 2872 cmd.exe 49 PID 2872 wrote to memory of 2780 2872 cmd.exe 50 PID 2872 wrote to memory of 2780 2872 cmd.exe 50 PID 2872 wrote to memory of 2780 2872 cmd.exe 50 PID 2872 wrote to memory of 2800 2872 cmd.exe 51 PID 2872 wrote to memory of 2800 2872 cmd.exe 51 PID 2872 wrote to memory of 2800 2872 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\sc.exesc delete vmickvpexchange3⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\system32\sc.exesc delete vmicguestinterface3⤵
- Launches sc.exe
PID:3036
-
-
C:\Windows\system32\sc.exesc delete vmicshutdown3⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\system32\sc.exesc delete vmicheartbeat3⤵
- Launches sc.exe
PID:2536
-
-
C:\Windows\system32\sc.exesc delete vmicrdv3⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\system32\sc.exesc delete storflt3⤵
- Launches sc.exe
PID:2556
-
-
C:\Windows\system32\sc.exesc delete vmictimesync3⤵
- Launches sc.exe
PID:2896
-
-
C:\Windows\system32\sc.exesc delete vmicvss3⤵
- Launches sc.exe
PID:2096
-
-
C:\Windows\system32\sc.exesc delete MSSQLFDLauncher3⤵
- Launches sc.exe
PID:2488
-
-
C:\Windows\system32\sc.exesc delete MSSQLSERVER3⤵
- Launches sc.exe
PID:2924
-
-
C:\Windows\system32\sc.exesc delete SQLSERVERAGENT3⤵
- Launches sc.exe
PID:2804
-
-
C:\Windows\system32\sc.exesc delete SQLBrowser3⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system32\sc.exesc delete SQLTELEMETRY3⤵
- Launches sc.exe
PID:2252
-
-
C:\Windows\system32\sc.exesc delete MsDtsServer1303⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\system32\sc.exesc delete SSISTELEMETRY1303⤵
- Launches sc.exe
PID:2932
-
-
C:\Windows\system32\sc.exesc delete SQLWriter3⤵
- Launches sc.exe
PID:2928
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$VEEAMSQL2012"3⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$VEEAMSQL2012"3⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\system32\sc.exesc delete MSSQL3⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\system32\sc.exesc delete SQLAgent3⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\system32\sc.exesc delete MSSQLServerADHelper1003⤵
- Launches sc.exe
PID:2824
-
-
C:\Windows\system32\sc.exesc delete MSSQLServerOLAPService3⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system32\sc.exesc delete MsDtsServer1003⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\system32\sc.exesc delete ReportServer3⤵
- Launches sc.exe
PID:3052
-
-
C:\Windows\system32\sc.exesc delete "SQLTELEMETRY$HL"3⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\system32\sc.exesc delete TMBMServer3⤵
- Launches sc.exe
PID:2376
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$PROGID"3⤵
- Launches sc.exe
PID:812
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$WOLTERSKLUWER"3⤵
- Launches sc.exe
PID:2752
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$PROGID"3⤵
- Launches sc.exe
PID:320
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$WOLTERSKLUWER"3⤵
- Launches sc.exe
PID:1516
-
-
C:\Windows\system32\sc.exesc delete "MSSQLFDLauncher$OPTIMA"3⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$OPTIMA"3⤵
- Launches sc.exe
PID:1828
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$OPTIMA"3⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\system32\sc.exesc delete "ReportServer$OPTIMA"3⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\system32\sc.exesc delete "msftesql$SQLEXPRESS"3⤵
- Launches sc.exe
PID:1164
-
-
C:\Windows\system32\sc.exesc delete "postgresql-x64-9.4"3⤵
- Launches sc.exe
PID:2984
-
-
C:\Windows\system32\sc.exesc delete WRSVC3⤵
- Launches sc.exe
PID:2552
-
-
C:\Windows\system32\sc.exesc delete ekrn3⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\system32\sc.exesc delete klim63⤵
- Launches sc.exe
PID:892
-
-
C:\Windows\system32\sc.exesc delete "AVP18.0.0"3⤵
- Launches sc.exe
PID:1136
-
-
C:\Windows\system32\sc.exesc delete KLIF3⤵
- Launches sc.exe
PID:2476
-
-
C:\Windows\system32\sc.exesc delete klpd3⤵
- Launches sc.exe
PID:2948
-
-
C:\Windows\system32\sc.exesc delete klflt3⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\system32\sc.exesc delete klbackupdisk3⤵
- Launches sc.exe
PID:2412
-
-
C:\Windows\system32\sc.exesc delete klbackupflt3⤵
- Launches sc.exe
PID:2616
-
-
C:\Windows\system32\sc.exesc delete klkbdflt3⤵
- Launches sc.exe
PID:2956
-
-
C:\Windows\system32\sc.exesc delete klmouflt3⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\system32\sc.exesc delete klhk3⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\system32\sc.exesc delete "KSDE1.0.0"3⤵
- Launches sc.exe
PID:2128
-
-
C:\Windows\system32\sc.exesc delete kltap3⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\sc.exesc delete TmFilter3⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\system32\sc.exesc delete TMLWCSService3⤵
- Launches sc.exe
PID:884
-
-
C:\Windows\system32\sc.exesc delete tmusa3⤵
- Launches sc.exe
PID:936
-
-
C:\Windows\system32\sc.exesc delete TmPreFilter3⤵
- Launches sc.exe
PID:1240
-
-
C:\Windows\system32\sc.exesc delete TMSmartRelayService3⤵
- Launches sc.exe
PID:940
-
-
C:\Windows\system32\sc.exesc delete TMiCRCScanService3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\system32\sc.exesc delete VSApiNt3⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exesc delete TmCCSF3⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\system32\sc.exesc delete tmlisten3⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\system32\sc.exesc delete TmProxy3⤵
- Launches sc.exe
PID:1012
-
-
C:\Windows\system32\sc.exesc delete ntrtscan3⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\system32\sc.exesc delete ofcservice3⤵
- Launches sc.exe
PID:1192
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:436
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:840
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1524
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3File Deletion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549b36224fae7dbefb25c3891d40b09c6
SHA152ef6aa887c8adc05b110fac9aecfad4506c407a
SHA256e078f59a6af5f5158a1ced74e9445644274cce7f63fce171b7a771d686f52a70
SHA512bade1fed5f78b5b5a55cb78138c19ab2bd8ed08a4f1d9feca3194ed7d0b44a0f6f85b944b6558ced225238c828e8e33dc6cc2355cf40f07a6708efa52ac74d28