Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 18:15
Behavioral task
behavioral1
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
-
Size
47KB
-
MD5
5c48b93df8207e404318b292bfe910d1
-
SHA1
66bb4b52371c32b8015eea3b136816bdb221cd93
-
SHA256
9b0c1a34ff866490ee3db6e61fde2b97173dd95d02ba4fdceeacbe3e9441ee3c
-
SHA512
7a2020a613ec2aaee5332f1485837d55b593b9cc6b2db3db8c7c1e7b37ff496d378c2143d9c47ca7a89d63f7b8b1f5f3cb12d3dcc1668f8697090714ff07e98d
-
SSDEEP
768:YgqXOpw0VIWzh+1mQjPW+yHdykGlsxxGfnk70R6iOw4SbzxClJADVDwkvDx5TSBH:YvOpwmZUmQjCHdmKKR6iuoClJADVDrx6
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Makop family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 952 wbadmin.exe -
Stops running service(s) 4 TTPs
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 21 IoCs
flow ioc 4 iplogger.org 5 iplogger.org 10 iplogger.org 28 iplogger.org 29 iplogger.org 30 iplogger.org 27 iplogger.org 8 iplogger.org 9 iplogger.org 11 iplogger.org 12 iplogger.org 23 iplogger.org 24 iplogger.org 31 iplogger.org 13 iplogger.org 22 iplogger.org 32 iplogger.org 33 iplogger.org 25 iplogger.org 26 iplogger.org 34 iplogger.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Yakutsk 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\setup_wm.exe.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf.[8B3239E6-W].[[email protected]].makop 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\ShapeCollector.exe.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Uzhgorod 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.jdp_5.5.0.165303.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\WordMUI.XML 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\msdaorar.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground_PAL.wmv 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01172_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341447.JPG 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR43F.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsHomePageScript.js 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_GreenTea.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianReport.Dotx 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\wmlaunch.exe.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\vlc.mo 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIconsMask.bmp 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ho_Chi_Minh 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\dailymotion.luac 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mousedown.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107724.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Xusage.txt 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\slideShow.html 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00438_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OOFTMPL.CFG 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\1047x576black.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\en-US\msdaorar.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00190_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXC 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR6F.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_ButtonGraphic.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Buenos_Aires 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\J0115875.GIF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_right.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core.xml 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01575_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMSS.ICO 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\gadget.xml 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\InkObj.dll.mui 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00544_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0168644.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382836.JPG 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_GreenTea.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_mid.gif 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Priority.accft 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-gibbous_partly-cloudy.png 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-It.otf.[8B3239E6-W].[[email protected]].makop 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00397_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02166_.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099175.WMF 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Phone.accft 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jconsole.jar 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\vlc.mo 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Launches sc.exe 62 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1780 sc.exe 2972 sc.exe 3044 sc.exe 2500 sc.exe 3068 sc.exe 3064 sc.exe 2860 sc.exe 1976 sc.exe 2920 sc.exe 2744 sc.exe 2364 sc.exe 1112 sc.exe 2464 sc.exe 2676 sc.exe 3016 sc.exe 1788 sc.exe 1524 sc.exe 2584 sc.exe 2688 sc.exe 2520 sc.exe 2704 sc.exe 2728 sc.exe 2700 sc.exe 2336 sc.exe 2732 sc.exe 2988 sc.exe 1356 sc.exe 2324 sc.exe 1284 sc.exe 2984 sc.exe 1688 sc.exe 2420 sc.exe 2884 sc.exe 2668 sc.exe 2656 sc.exe 2808 sc.exe 2908 sc.exe 2772 sc.exe 2788 sc.exe 2840 sc.exe 2852 sc.exe 2196 sc.exe 1480 sc.exe 3032 sc.exe 2996 sc.exe 2832 sc.exe 2900 sc.exe 1644 sc.exe 1528 sc.exe 2108 sc.exe 2424 sc.exe 1816 sc.exe 1160 sc.exe 2940 sc.exe 3024 sc.exe 1592 sc.exe 2156 sc.exe 2136 sc.exe 2540 sc.exe 2800 sc.exe 1636 sc.exe 1952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 376 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 472 vssvc.exe Token: SeRestorePrivilege 472 vssvc.exe Token: SeAuditPrivilege 472 vssvc.exe Token: SeBackupPrivilege 2304 wbengine.exe Token: SeRestorePrivilege 2304 wbengine.exe Token: SeSecurityPrivilege 2304 wbengine.exe Token: SeIncreaseQuotaPrivilege 1764 WMIC.exe Token: SeSecurityPrivilege 1764 WMIC.exe Token: SeTakeOwnershipPrivilege 1764 WMIC.exe Token: SeLoadDriverPrivilege 1764 WMIC.exe Token: SeSystemProfilePrivilege 1764 WMIC.exe Token: SeSystemtimePrivilege 1764 WMIC.exe Token: SeProfSingleProcessPrivilege 1764 WMIC.exe Token: SeIncBasePriorityPrivilege 1764 WMIC.exe Token: SeCreatePagefilePrivilege 1764 WMIC.exe Token: SeBackupPrivilege 1764 WMIC.exe Token: SeRestorePrivilege 1764 WMIC.exe Token: SeShutdownPrivilege 1764 WMIC.exe Token: SeDebugPrivilege 1764 WMIC.exe Token: SeSystemEnvironmentPrivilege 1764 WMIC.exe Token: SeRemoteShutdownPrivilege 1764 WMIC.exe Token: SeUndockPrivilege 1764 WMIC.exe Token: SeManageVolumePrivilege 1764 WMIC.exe Token: 33 1764 WMIC.exe Token: 34 1764 WMIC.exe Token: 35 1764 WMIC.exe Token: SeIncreaseQuotaPrivilege 1764 WMIC.exe Token: SeSecurityPrivilege 1764 WMIC.exe Token: SeTakeOwnershipPrivilege 1764 WMIC.exe Token: SeLoadDriverPrivilege 1764 WMIC.exe Token: SeSystemProfilePrivilege 1764 WMIC.exe Token: SeSystemtimePrivilege 1764 WMIC.exe Token: SeProfSingleProcessPrivilege 1764 WMIC.exe Token: SeIncBasePriorityPrivilege 1764 WMIC.exe Token: SeCreatePagefilePrivilege 1764 WMIC.exe Token: SeBackupPrivilege 1764 WMIC.exe Token: SeRestorePrivilege 1764 WMIC.exe Token: SeShutdownPrivilege 1764 WMIC.exe Token: SeDebugPrivilege 1764 WMIC.exe Token: SeSystemEnvironmentPrivilege 1764 WMIC.exe Token: SeRemoteShutdownPrivilege 1764 WMIC.exe Token: SeUndockPrivilege 1764 WMIC.exe Token: SeManageVolumePrivilege 1764 WMIC.exe Token: 33 1764 WMIC.exe Token: 34 1764 WMIC.exe Token: 35 1764 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2380 2600 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2600 wrote to memory of 2380 2600 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2600 wrote to memory of 2380 2600 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2600 wrote to memory of 2380 2600 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe 30 PID 2380 wrote to memory of 2656 2380 cmd.exe 32 PID 2380 wrote to memory of 2656 2380 cmd.exe 32 PID 2380 wrote to memory of 2656 2380 cmd.exe 32 PID 2380 wrote to memory of 2156 2380 cmd.exe 33 PID 2380 wrote to memory of 2156 2380 cmd.exe 33 PID 2380 wrote to memory of 2156 2380 cmd.exe 33 PID 2380 wrote to memory of 2988 2380 cmd.exe 34 PID 2380 wrote to memory of 2988 2380 cmd.exe 34 PID 2380 wrote to memory of 2988 2380 cmd.exe 34 PID 2380 wrote to memory of 2500 2380 cmd.exe 35 PID 2380 wrote to memory of 2500 2380 cmd.exe 35 PID 2380 wrote to memory of 2500 2380 cmd.exe 35 PID 2380 wrote to memory of 2136 2380 cmd.exe 36 PID 2380 wrote to memory of 2136 2380 cmd.exe 36 PID 2380 wrote to memory of 2136 2380 cmd.exe 36 PID 2380 wrote to memory of 2108 2380 cmd.exe 37 PID 2380 wrote to memory of 2108 2380 cmd.exe 37 PID 2380 wrote to memory of 2108 2380 cmd.exe 37 PID 2380 wrote to memory of 2540 2380 cmd.exe 38 PID 2380 wrote to memory of 2540 2380 cmd.exe 38 PID 2380 wrote to memory of 2540 2380 cmd.exe 38 PID 2380 wrote to memory of 2772 2380 cmd.exe 39 PID 2380 wrote to memory of 2772 2380 cmd.exe 39 PID 2380 wrote to memory of 2772 2380 cmd.exe 39 PID 2380 wrote to memory of 2464 2380 cmd.exe 40 PID 2380 wrote to memory of 2464 2380 cmd.exe 40 PID 2380 wrote to memory of 2464 2380 cmd.exe 40 PID 2380 wrote to memory of 2788 2380 cmd.exe 41 PID 2380 wrote to memory of 2788 2380 cmd.exe 41 PID 2380 wrote to memory of 2788 2380 cmd.exe 41 PID 2380 wrote to memory of 2808 2380 cmd.exe 42 PID 2380 wrote to memory of 2808 2380 cmd.exe 42 PID 2380 wrote to memory of 2808 2380 cmd.exe 42 PID 2380 wrote to memory of 2908 2380 cmd.exe 43 PID 2380 wrote to memory of 2908 2380 cmd.exe 43 PID 2380 wrote to memory of 2908 2380 cmd.exe 43 PID 2380 wrote to memory of 2920 2380 cmd.exe 44 PID 2380 wrote to memory of 2920 2380 cmd.exe 44 PID 2380 wrote to memory of 2920 2380 cmd.exe 44 PID 2380 wrote to memory of 2940 2380 cmd.exe 45 PID 2380 wrote to memory of 2940 2380 cmd.exe 45 PID 2380 wrote to memory of 2940 2380 cmd.exe 45 PID 2380 wrote to memory of 3068 2380 cmd.exe 46 PID 2380 wrote to memory of 3068 2380 cmd.exe 46 PID 2380 wrote to memory of 3068 2380 cmd.exe 46 PID 2380 wrote to memory of 2832 2380 cmd.exe 47 PID 2380 wrote to memory of 2832 2380 cmd.exe 47 PID 2380 wrote to memory of 2832 2380 cmd.exe 47 PID 2380 wrote to memory of 3064 2380 cmd.exe 48 PID 2380 wrote to memory of 3064 2380 cmd.exe 48 PID 2380 wrote to memory of 3064 2380 cmd.exe 48 PID 2380 wrote to memory of 2984 2380 cmd.exe 49 PID 2380 wrote to memory of 2984 2380 cmd.exe 49 PID 2380 wrote to memory of 2984 2380 cmd.exe 49 PID 2380 wrote to memory of 2688 2380 cmd.exe 50 PID 2380 wrote to memory of 2688 2380 cmd.exe 50 PID 2380 wrote to memory of 2688 2380 cmd.exe 50 PID 2380 wrote to memory of 2520 2380 cmd.exe 51 PID 2380 wrote to memory of 2520 2380 cmd.exe 51 PID 2380 wrote to memory of 2520 2380 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\sc.exesc delete vmickvpexchange3⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exesc delete vmicguestinterface3⤵
- Launches sc.exe
PID:2156
-
-
C:\Windows\system32\sc.exesc delete vmicshutdown3⤵
- Launches sc.exe
PID:2988
-
-
C:\Windows\system32\sc.exesc delete vmicheartbeat3⤵
- Launches sc.exe
PID:2500
-
-
C:\Windows\system32\sc.exesc delete vmicrdv3⤵
- Launches sc.exe
PID:2136
-
-
C:\Windows\system32\sc.exesc delete storflt3⤵
- Launches sc.exe
PID:2108
-
-
C:\Windows\system32\sc.exesc delete vmictimesync3⤵
- Launches sc.exe
PID:2540
-
-
C:\Windows\system32\sc.exesc delete vmicvss3⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exesc delete MSSQLFDLauncher3⤵
- Launches sc.exe
PID:2464
-
-
C:\Windows\system32\sc.exesc delete MSSQLSERVER3⤵
- Launches sc.exe
PID:2788
-
-
C:\Windows\system32\sc.exesc delete SQLSERVERAGENT3⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\system32\sc.exesc delete SQLBrowser3⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\system32\sc.exesc delete SQLTELEMETRY3⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\system32\sc.exesc delete MsDtsServer1303⤵
- Launches sc.exe
PID:2940
-
-
C:\Windows\system32\sc.exesc delete SSISTELEMETRY1303⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\sc.exesc delete SQLWriter3⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$VEEAMSQL2012"3⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$VEEAMSQL2012"3⤵
- Launches sc.exe
PID:2984
-
-
C:\Windows\system32\sc.exesc delete MSSQL3⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\system32\sc.exesc delete SQLAgent3⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\system32\sc.exesc delete MSSQLServerADHelper1003⤵
- Launches sc.exe
PID:2840
-
-
C:\Windows\system32\sc.exesc delete MSSQLServerOLAPService3⤵
- Launches sc.exe
PID:1356
-
-
C:\Windows\system32\sc.exesc delete MsDtsServer1003⤵
- Launches sc.exe
PID:2860
-
-
C:\Windows\system32\sc.exesc delete ReportServer3⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\system32\sc.exesc delete "SQLTELEMETRY$HL"3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\system32\sc.exesc delete TMBMServer3⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$PROGID"3⤵
- Launches sc.exe
PID:2728
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$WOLTERSKLUWER"3⤵
- Launches sc.exe
PID:2972
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$PROGID"3⤵
- Launches sc.exe
PID:2676
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$WOLTERSKLUWER"3⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\system32\sc.exesc delete "MSSQLFDLauncher$OPTIMA"3⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\system32\sc.exesc delete "MSSQL$OPTIMA"3⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\system32\sc.exesc delete "SQLAgent$OPTIMA"3⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\system32\sc.exesc delete "ReportServer$OPTIMA"3⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\system32\sc.exesc delete "msftesql$SQLEXPRESS"3⤵
- Launches sc.exe
PID:2196
-
-
C:\Windows\system32\sc.exesc delete "postgresql-x64-9.4"3⤵
- Launches sc.exe
PID:2324
-
-
C:\Windows\system32\sc.exesc delete WRSVC3⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\system32\sc.exesc delete ekrn3⤵
- Launches sc.exe
PID:1688
-
-
C:\Windows\system32\sc.exesc delete klim63⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\system32\sc.exesc delete "AVP18.0.0"3⤵
- Launches sc.exe
PID:1480
-
-
C:\Windows\system32\sc.exesc delete KLIF3⤵
- Launches sc.exe
PID:3024
-
-
C:\Windows\system32\sc.exesc delete klpd3⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exesc delete klflt3⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\system32\sc.exesc delete klbackupdisk3⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\system32\sc.exesc delete klbackupflt3⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\system32\sc.exesc delete klkbdflt3⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\system32\sc.exesc delete klmouflt3⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\system32\sc.exesc delete klhk3⤵
- Launches sc.exe
PID:2668
-
-
C:\Windows\system32\sc.exesc delete "KSDE1.0.0"3⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\system32\sc.exesc delete kltap3⤵
- Launches sc.exe
PID:2996
-
-
C:\Windows\system32\sc.exesc delete TmFilter3⤵
- Launches sc.exe
PID:1788
-
-
C:\Windows\system32\sc.exesc delete TMLWCSService3⤵
- Launches sc.exe
PID:2424
-
-
C:\Windows\system32\sc.exesc delete tmusa3⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\system32\sc.exesc delete TmPreFilter3⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\system32\sc.exesc delete TMSmartRelayService3⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system32\sc.exesc delete TMiCRCScanService3⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\system32\sc.exesc delete VSApiNt3⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\sc.exesc delete TmCCSF3⤵
- Launches sc.exe
PID:1160
-
-
C:\Windows\system32\sc.exesc delete tmlisten3⤵
- Launches sc.exe
PID:1592
-
-
C:\Windows\system32\sc.exesc delete TmProxy3⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exesc delete ntrtscan3⤵
- Launches sc.exe
PID:1528
-
-
C:\Windows\system32\sc.exesc delete ofcservice3⤵
- Launches sc.exe
PID:1284
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:376
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:952
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:528
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:472
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3040
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3File Deletion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549b36224fae7dbefb25c3891d40b09c6
SHA152ef6aa887c8adc05b110fac9aecfad4506c407a
SHA256e078f59a6af5f5158a1ced74e9445644274cce7f63fce171b7a771d686f52a70
SHA512bade1fed5f78b5b5a55cb78138c19ab2bd8ed08a4f1d9feca3194ed7d0b44a0f6f85b944b6558ced225238c828e8e33dc6cc2355cf40f07a6708efa52ac74d28