Analysis

  • max time kernel
    120s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 07:49

General

  • Target

    Payload/Apollo.app/AthenaWidget.xml

  • Size

    91KB

  • MD5

    f4ec872b6811f107369c25d335262aad

  • SHA1

    e96ec8206694e567498550eca1ed1b6eae7e1df1

  • SHA256

    7241a1c1304420aa5f8a63d64b179002262a64f4d516043378c940be66095c3a

  • SHA512

    289acc52a387367978f98f00d933d17bc30e8b0ae4ee81598e25f91aad08b87994fb43b02c2bf163ac7f34e026bdae2d7449e58694ba02f02f8af1112a10b162

  • SSDEEP

    384:ty0mgCwvqApfgKZu9dnmgMpuYvokkY5V7tMi1E8e+UCue02Sv1vaaSrbyzvywDMS:AHuQ9BjOgE+fNxWa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\AthenaWidget.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ef4c75f17a9b8b074badcdba61a4fd3

    SHA1

    50e2e69f7f8141636ccd94b91435fd2de6fa4323

    SHA256

    b836dda13d45aa8c93a8565a5022e6142ca1641d211876e1b52881bf98e354f9

    SHA512

    1ba855f849cc9ebb7869de6ca0a23cbf2b22a195b22f5cf08d20de3c11a0728d90ae64f9ab0282b2c18a86f2753e6cd5d431a54442555c410214e89fab2fdc46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78ebad15ac6749ce75636f4d308d94ac

    SHA1

    005ebfc46acc9fddd2d89e1b559c8f89c3fa03fc

    SHA256

    e529d841ef6a9cb33c80615d383e0a3895d5561e02273bdaf898ef38d415157d

    SHA512

    e1fb827993013a55c764de7787ec99f74bb74ba5f163941544411d78a106c1861a2ea28ea32152f337789d4ea3c071de79750932459e3a189cd654b7d05011ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b7a93ac065fcff425976c16a871309f

    SHA1

    46688e4c299366e93c32c101638cfb34d8e63910

    SHA256

    66084a08e419f3f73b0b994ef051d52e6e01df5b6bca7398663496355d63a939

    SHA512

    3f137c43b22b40d872d5cce8327f4c8d6d17a2d98bf40e2d5b4071acdb279c9884e29f4e21ce687bf2a75555db8758df21c1339338177108592cdf217eea5543

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b116cb63427ddc47d28a47887ee01d09

    SHA1

    b048b8b2af31fad25b40d59993b0727c76d25669

    SHA256

    0039ed17b421ac63a436ec9d6658d9d9acc900488523ffa331a83d93a2062c85

    SHA512

    8633aa380953f79936b7e2e89c540d1f77d88c1e6b2ac12c901ec4fb58b92ef5cc8b0539a73119a0e3cee10dc59914f1737493ef667e8b6cffaa0fa854667171

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2e2ce773c3436af57c21cd0c060f8af

    SHA1

    df1d15a74ad237414e895908efda1411c3e21696

    SHA256

    06fcd1cef8bf0540d71b8d37f9fe487eb3a70ba4a05493b2887c71849287b050

    SHA512

    0ff5addb60b1b7b7479d09dbced3c30a550d97a4bc4e1f848234dc8dbac6dbfb37d00a45ba7c4b540c33f79173eb28844fd4276cfb43ba3c679bdc0d27dfdd4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab3a345c9fe8dc90623184a9cb0a9657

    SHA1

    9e8945e630b453d84a58033ef7bdf1715d57aa09

    SHA256

    8b92672249e5f75d66705ebf0c65100e68ce11eaafb7447d66e1cecaa3a17139

    SHA512

    973468a1a76b3d22396faa1c5c5aa70d354bccc8ef45f2566a022fca1492d18180e06030858467dd76264095e3f43507d74168dd8e678fcefba1544fcd8d5a73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9ef4dad3c3ae00a7ca3b3e79fcd7be0

    SHA1

    8748a42dd0695b56f7479421bbb2a4e2ed320cea

    SHA256

    afc5c6b1d8a1702765d56bd67a7258357fc170a2848af3983ff17068601754c7

    SHA512

    a4076df675bfbfecf7788481ade81acaa06b05f23c594acaf04d6474cabb93766c155663eba0e885f8bb26928a762d7ad029334114fa6bc10c062388c583bd40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47a4ab9b8802a3e21e9da099e1eaba74

    SHA1

    6086f229cd3f738d96d48a5de17fc6f90e605a74

    SHA256

    c0cb84e864514a788e34752a7e63eb1e0630befaa600b37ae159e0555b6dbb93

    SHA512

    c43202800f1c38ff152bb595451cf445b91a137b20edf5685c77ca79e1754c8d1c9f4f5ced08b65b8fad62c6b9ff396920eee6ba1316f2a14d746256b361eb89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e44aee7ddfc0d015f68e51a80b8e5ad7

    SHA1

    535f72bac2e2f75769815353a36b490403fffe32

    SHA256

    11c1d0bf1a8a3ea30837624839817b47845dbe7808bb525d391cedbafd9c75e1

    SHA512

    fa042df857eac8646fd70e9481aa6703100e095a5465735896770dfe9472b76deb91b9570cc098279416891ac4f71589bdf45637aadacf5aadc271d08f6936ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c170a8d9c82248f20a83f14d4916544c

    SHA1

    7637808638d486e36f5f266798befd69cc25e589

    SHA256

    e61c7af5231bdb585a473f8c53911b3e3d6519d1256070b828fba9c83f21be29

    SHA512

    557f8808714c96d36c10ee0c957bf956be8b5c4bd6d33df584c295d130957dcf1ad3e2f0841aa860d0fc888de721283ad435676249dca1fba039a4d952034b0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0250e2be65bc2573eea3aa738547e5f9

    SHA1

    838ca82b1766adec3f711fd250e9cbd3af9e9f1e

    SHA256

    a6271edc14bc9be1a4d6f2adc09430da2e419655f96738bfa5eb74f050cb1467

    SHA512

    17389a5adb505ce19ff276344926f499434735aaa1cad358b0a99a0985fa922dc79752e078cc5533fdef7f09ecbc93c6a8a6c7a430265c4c180a9d94d21ecdd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cc1bc521594b8e01b113457acbfcda0

    SHA1

    8ca1b0b6debc3dd9771f43183808f35a8a7bdca3

    SHA256

    d5995a8c8e77d35a8d5681addfd78e85fd4cfe3d61c75133b8026878405dc261

    SHA512

    e706289a771a4b66c6e63c91d418493ab387b3b3842e43db5ba941d7b7b5cffd0fde75ad1de9a2c7210e79e79840d26c9455fbc1c29438cc64b39f1ae17ceb0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    328381ba5f7e2cee25f675f0ee727c8f

    SHA1

    ed4a68a990dac363ee67caf0a5c15d846be41cc8

    SHA256

    d0499ce326f85b55c135867b345358d6f960b2c8cd03a056bb05fad0ae82c06d

    SHA512

    82e2d9488354a9ef58a646448988740ac57eabad6e0b5f59a8a9e9291b042b96273254027f62d62e44e777e08da4001ceda55207f2e48a082654929c712c3d7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8df3169264dfef617790d760a727ad66

    SHA1

    70d314bf02e98825a2413e0341cffad2de31e1c8

    SHA256

    d5d8c5116c7ecb1d37cac1c3e8e7d7beeb5b1a66d2814c7de14cd5b5d69410cf

    SHA512

    22158913979c996190650e25afe59e308c5b38d21f9e2d8fbded0027e400191b9c46267afd26ededc617902baa273beb5c70d248a36cae58bc58be349e23335d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    099d0fef34afe5f4e3a5322a62d3b808

    SHA1

    75aca008395bf79d71b51d203dcf9be58ffa442d

    SHA256

    28c87f8ca01a07f7e7d308cefd442e11e5ab88b36a5cc58d4ce1b210507f0a57

    SHA512

    1334489c192826883641db8c1801c1f24447c73638557fe345c4b0c2159ebe1aff2c9909dceaf39ab541abf70f7bd60daca57c5974b5af5742e408999ca71ec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a033d770e38d7c1b6532be3b5e83f90b

    SHA1

    cd203db943a2c1a5cedc64a52df97796786cb441

    SHA256

    5d8348e4c28dc780ad0828e026878bd1ced8e281c0a8a9d32fe26d8d86ffec54

    SHA512

    face3bf241db2f89cf9bfe6c7d26d7ce2421087958d2ccabdab4a3c9a87aec9d3f3c78572ffd9cd8727253cd5d8cabab5e6e785736cb54fae752264d59a99a21

  • C:\Users\Admin\AppData\Local\Temp\Cab2E54.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2FF0.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63