Analysis
-
max time kernel
8s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Spyroid Rat v8.5 Original Cracked.exe
Resource
win10v2004-20241007-en
General
-
Target
Spyroid Rat v8.5 Original Cracked.exe
-
Size
55.7MB
-
MD5
f2a9d485cc841bbd44543973e3739c05
-
SHA1
53235a653bfc5822693e9adfdea01e1164909df9
-
SHA256
37fae2ac78281be79821e625ba969bcd0c11336c56e68b71b5fbb284e9f8fd60
-
SHA512
4de26d0f38868934182e0ef1fc3270990a66eba2c6af340490f55e4bf7f04696f91f93f62457191031d468e34c0ec5f0ba4995df63275dbf77254b1a7d2be56d
-
SSDEEP
786432:JrXC9Vqv1tRgvtgkG8iAl0dYyBGpjKElxsdo/AG9Lqxlwy+WpL15Q7HxJ1KP3u5C:JjC9VvtdG8iV6jKmqdo/ry+gXwIuqxZ
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9b-6.dat family_stormkitty behavioral1/memory/2572-27-0x0000000000190000-0x00000000001E6000-memory.dmp family_stormkitty -
Stormkitty family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 1 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 3760 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Spyroid Rat v8.5 Original Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation test rdp.exe -
Executes dropped EXE 3 IoCs
pid Process 2572 rl payload.exe 2584 test rdp.exe 4640 Spyroid Rat V8.5 Cracked.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rl payload.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rl payload.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rl payload.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\ProgramData\YQRLKYON\FileGrabber\Desktop\desktop.ini rl payload.exe File created C:\ProgramData\YQRLKYON\FileGrabber\Documents\desktop.ini rl payload.exe File created C:\ProgramData\YQRLKYON\FileGrabber\Downloads\desktop.ini rl payload.exe File created C:\ProgramData\YQRLKYON\FileGrabber\Pictures\desktop.ini rl payload.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 freegeoip.app 16 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rl payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test rdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2184 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2572 rl payload.exe 2572 rl payload.exe 2572 rl payload.exe 1332 powershell.exe 1332 powershell.exe 2572 rl payload.exe 2572 rl payload.exe 2572 rl payload.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2572 rl payload.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2572 1704 Spyroid Rat v8.5 Original Cracked.exe 83 PID 1704 wrote to memory of 2572 1704 Spyroid Rat v8.5 Original Cracked.exe 83 PID 1704 wrote to memory of 2572 1704 Spyroid Rat v8.5 Original Cracked.exe 83 PID 1704 wrote to memory of 2584 1704 Spyroid Rat v8.5 Original Cracked.exe 84 PID 1704 wrote to memory of 2584 1704 Spyroid Rat v8.5 Original Cracked.exe 84 PID 1704 wrote to memory of 2584 1704 Spyroid Rat v8.5 Original Cracked.exe 84 PID 2584 wrote to memory of 1332 2584 test rdp.exe 85 PID 2584 wrote to memory of 1332 2584 test rdp.exe 85 PID 2584 wrote to memory of 1332 2584 test rdp.exe 85 PID 1704 wrote to memory of 4640 1704 Spyroid Rat v8.5 Original Cracked.exe 87 PID 1704 wrote to memory of 4640 1704 Spyroid Rat v8.5 Original Cracked.exe 87 PID 1332 wrote to memory of 1220 1332 powershell.exe 89 PID 1332 wrote to memory of 1220 1332 powershell.exe 89 PID 1332 wrote to memory of 1220 1332 powershell.exe 89 PID 1220 wrote to memory of 624 1220 net.exe 90 PID 1220 wrote to memory of 624 1220 net.exe 90 PID 1220 wrote to memory of 624 1220 net.exe 90 PID 2584 wrote to memory of 2348 2584 test rdp.exe 91 PID 2584 wrote to memory of 2348 2584 test rdp.exe 91 PID 2584 wrote to memory of 2348 2584 test rdp.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rl payload.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rl payload.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spyroid Rat v8.5 Original Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Spyroid Rat v8.5 Original Cracked.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\rl payload.exe"C:\Users\Admin\AppData\Local\Temp\rl payload.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\test rdp.exe"C:\Users\Admin\AppData\Local\Temp\test rdp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net user ThanksEgalsa ThanksEgalsa /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" user ThanksEgalsa ThanksEgalsa /add4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user ThanksEgalsa ThanksEgalsa /add5⤵
- System Location Discovery: System Language Discovery
PID:624
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net localgroup administrators ThanksEgalsa /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup administrators ThanksEgalsa /add4⤵PID:4628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators ThanksEgalsa /add5⤵PID:636
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net localgroup "Remote Desktop Users" ThanksEgalsa /add3⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:3760 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Remote Desktop Users ThanksEgalsa /add4⤵PID:4724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Remote Desktop Users ThanksEgalsa /add5⤵PID:2368
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE30D.tmp.cmd""3⤵PID:3600
-
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Spyroid Rat V8.5 Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Spyroid Rat V8.5 Cracked.exe"2⤵
- Executes dropped EXE
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
11KB
MD5bd57923c9c103568b3a738b03cbd5081
SHA17d9378108c6c58055c5256437fe420cfb1d14e11
SHA256001cf3ae7394e542620ca1b383a75bb6052c60f247417ff0f3b8ec784f6ba5a9
SHA512181479d91b4c0d5df66047aae7d02db18e476928ea54a27ad79ab7445d58d6bf1ab6634929429c1f20d854ab5396981725c055c6b418cabdca205e3500aa3fda
-
Filesize
11KB
MD56bb3001225c185923e5aefa34b99791e
SHA11f5a1fa59eb6a001424f0136ce42541e63ccbb99
SHA2560b037c9312f466a51fe020ae247d663af6dc4f330ca524ba9bc9ff6e5f0a3740
SHA5125976103c18fc49ea02a7372bb51cc263611aba90bb3a9784d8cef66541219f2824cc8cae545ad38bd153811f5dc43514932906f5efc4ac45d012e55842fccd25
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
320KB
MD5dfa05cfd683034da7b16c32b76a6619c
SHA1efe6fa32ba1c53155ed6acc32de614a3ca8cadff
SHA2560c67544fc30499491749cc9cda184c4af9e61bf16dd697b402ad936df9e182f3
SHA512cb966cf5dba9b32950b0f96e62dedcaeb1de22ee41a010f247f4e3ac2be602075bcd76d71a431164cee649ba4e91319a4dad41f553260ecffc7c02905d5889f9
-
Filesize
8KB
MD56019493627e029531ac13da62d870719
SHA146d7c20fd308c376e40060ee455743f7b913f7af
SHA2560b85f47949effe436c598cddf1ddabf1b952eac63009d25fdee34f864bc10569
SHA512a125613e5718dea3499e5a1b4b13dc48eef6b5bbc33462ae2a6cda2efd129992fec09ed799be738048c226e4f1743e4cc298236c2c9d2acf41c8301830a328da
-
Filesize
154B
MD5c59c10afb6bbb536cf3698667e29a6d9
SHA1fa822ed7aaef38161ba6e4e266ffa2558136a945
SHA2567d6b13a567eb7666bc20020c04411d7896d38a61b8fad85429acd2ccdfec0530
SHA512e3750d024d2cf5b9295f716db833cb919eb413cef5da8d2ed645603550dde6bd672e5c5e23cea80d0057859ac6c084730ca4fcec5c85dc092861aada35c7ef17