Overview
overview
10Static
static
10Bunifu.Licensing.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1DragAssembly.dll
windows10-2004-x64
1Mono.Cecil.Mdb.dll
windows10-2004-x64
1Mono.Cecil.Pdb.dll
windows10-2004-x64
1Mono.Cecil.Rocks.dll
windows10-2004-x64
1Mono.Cecil.dll
windows10-2004-x64
1Prynt Stea...ed.exe
windows10-2004-x64
10Siticone.UI.dll
windows10-2004-x64
1stub/DotNetZip.dll
windows10-2004-x64
1stub/DotNetZip_.dll
windows10-2004-x64
1stub/build.exe
windows10-2004-x64
10stub/stub4.5.1.exe
windows10-2004-x64
10stub/stub4.5.exe
windows10-2004-x64
10Analysis
-
max time kernel
55s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 05:28
Behavioral task
behavioral1
Sample
Bunifu.Licensing.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Bunifu.UI.WinForms.BunifuButton.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Bunifu.UI.WinForms.BunifuCheckBox.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
Bunifu.UI.WinForms.BunifuGradientPanel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Bunifu.UI.WinForms.BunifuLabel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Bunifu.UI.WinForms.BunifuPanel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Bunifu.UI.WinForms.BunifuPictureBox.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Bunifu.UI.WinForms.BunifuShadowPanel.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Bunifu.UI.WinForms.BunifuTextbox.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
DragAssembly.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Mono.Cecil.Mdb.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral12
Sample
Mono.Cecil.Pdb.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Mono.Cecil.Rocks.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Mono.Cecil.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Prynt Stealer 5.6fixed.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
Siticone.UI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
stub/DotNetZip.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
stub/DotNetZip_.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
stub/build.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
stub/stub4.5.1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
stub/stub4.5.exe
Resource
win10v2004-20230220-en
General
-
Target
stub/build.exe
-
Size
250KB
-
MD5
efaaca4cae6d960c91f279ac977d645f
-
SHA1
97f455488bef96429253dd4e24c055470780143b
-
SHA256
62a71deb9d259ea7b259bbfc9a254f382a695d89702d5ba02328a67eed23c6b4
-
SHA512
a595ae55a0c7ffea98b0ef31b58c701d4f582ed2db01a89ce00dc9f947099cdbd3f261efccae4d68e31da70bb40c9ac947bed58fb9e9e500e02bdb5d82b55d79
-
SSDEEP
6144:MDfJCTwQvNm9bQdK1FcSEuNYnMuBAnLzuyvwWoSF:sRCTwcEFEuNYB8z1wWo4
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral19/memory/768-133-0x00000269D1280000-0x00000269D12C4000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
build.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation build.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2552 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4160 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
build.exetaskkill.exedescription pid process Token: SeDebugPrivilege 768 build.exe Token: SeDebugPrivilege 4160 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
build.execmd.exedescription pid process target process PID 768 wrote to memory of 3244 768 build.exe cmd.exe PID 768 wrote to memory of 3244 768 build.exe cmd.exe PID 3244 wrote to memory of 2016 3244 cmd.exe chcp.com PID 3244 wrote to memory of 2016 3244 cmd.exe chcp.com PID 3244 wrote to memory of 4160 3244 cmd.exe taskkill.exe PID 3244 wrote to memory of 4160 3244 cmd.exe taskkill.exe PID 3244 wrote to memory of 2552 3244 cmd.exe timeout.exe PID 3244 wrote to memory of 2552 3244 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub\build.exe"C:\Users\Admin\AppData\Local\Temp\stub\build.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8477.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8477.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2016
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM 7683⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\system32\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD54d354ae856258dd89bef3f365b4660ad
SHA1c94239f0766218061228242f3ff7a9c621d57d3b
SHA2567e5907e9bddc911a16365a4f95f4b09c4931cbcc4707cf300076a22a107c00ce
SHA512077155ed742524fd962cd582c11ae96ee9af6aa7fb834d9b3310d443008cdfdb0d9f320ff393e3bb616ab39d044531b9d51e7c49b076179da83f9718efa333d3