Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/06/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
StockControl.py
Resource
win10-20230220-en
6 signatures
300 seconds
General
-
Target
StockControl.py
-
Size
5KB
-
MD5
7c9d71bdcdf2f0becb80c9991e8b0705
-
SHA1
606523fd5c8364e30e0e7eb1158a3b9cd3560520
-
SHA256
88e56052707d63366f7cbd45efe089b24638bf0cb6fd8561533dc165f015e7b3
-
SHA512
f4fe910c80f851baa219ea259e79f7305895ed4dea5d1406e52cff7f9e18c1312df630e0c9b7fa2c68a66b8eb4a689ec2c82f52dc85581722ebed5e71ace6b26
-
SSDEEP
96:dZPiVVnguiPSKiXSfwQYAZh/L8X00F/KiaAvTez4:gVnguiGNDih/2f/Roz4
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4884 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1684 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe 1684 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4884 1684 OpenWith.exe 68 PID 1684 wrote to memory of 4884 1684 OpenWith.exe 68
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\StockControl.py1⤵
- Modifies registry class
PID:4824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\StockControl.py2⤵
- Opens file in notepad (likely ransom note)
PID:4884
-