Overview
overview
3Static
static
1NO-EXTENSI...10.zip
windows7-x64
1NO-EXTENSI...10.zip
windows10-2004-x64
1Payload/Ap...Apollo
macos-10.15-amd64
1Payload/Ap...ts.xml
windows7-x64
1Payload/Ap...ts.xml
windows10-2004-x64
1Payload/Ap...2x.png
windows7-x64
3Payload/Ap...2x.png
windows10-2004-x64
3Payload/Ap...ad.png
windows7-x64
3Payload/Ap...ad.png
windows10-2004-x64
3Payload/Ap...ts.car
windows7-x64
3Payload/Ap...ts.car
windows10-2004-x64
3Payload/Ap...et.xml
windows7-x64
1Payload/Ap...et.xml
windows10-2004-x64
1Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap...t3.nib
windows7-x64
3Payload/Ap...t3.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...VM.nib
windows7-x64
3Payload/Ap...VM.nib
windows10-2004-x64
3Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...orking
macos-10.15-amd64
1Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
NO-EXTENSIONS_Apollo-1.15.11_improvedcustomapi-1.0.10.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
NO-EXTENSIONS_Apollo-1.15.11_improvedcustomapi-1.0.10.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Payload/Apollo.app/Apollo
Resource
macos-20240214-en
Behavioral task
behavioral4
Sample
Payload/Apollo.app/ApolloIntents.xml
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
Payload/Apollo.app/ApolloIntents.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Payload/Apollo.app/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
Payload/Apollo.app/AppIcon76x76@2x~ipad.png
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
Payload/Apollo.app/AppIcon76x76@2x~ipad.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
Payload/Apollo.app/Assets.car
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
Payload/Apollo.app/Assets.car
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
Payload/Apollo.app/AthenaWidget.xml
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
Payload/Apollo.app/AthenaWidget.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
Payload/Apollo.app/BanDurationTableViewCell.nib
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
Payload/Apollo.app/BanDurationTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/UIViewController-01J-lp-oVM.nib
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/UIViewController-01J-lp-oVM.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
Payload/Apollo.app/BrightnessThresholdTableViewCell.nib
Resource
win7-20240220-en
Behavioral task
behavioral23
Sample
Payload/Apollo.app/BrightnessThresholdTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
Payload/Apollo.app/CommentColorThemes.plist
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
Payload/Apollo.app/CommentColorThemes.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
Payload/Apollo.app/DatePickerTableViewCell.nib
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
Payload/Apollo.app/DatePickerTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
Payload/Apollo.app/Defaults.plist
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
Payload/Apollo.app/Defaults.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/AFNetworking
Resource
macos-20240214-en
Behavioral task
behavioral31
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/Info.plist
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/Info.plist
Resource
win10v2004-20240226-en
General
-
Target
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
-
Size
2KB
-
MD5
3622631742658e0a76441ed6c6230ace
-
SHA1
2906892e85fe40e2075b21b77415bd8c0188b564
-
SHA256
d7c09308aee8b8f03524947d4da1f328af63df8be7aeab6442c575d50ab4601a
-
SHA512
ade75b3e1659d6a6f74be69d9107e5278aced033297634cde612bd6c5eae12fa9338a97dde6220f64af173431b55aecfb4f11b9c8a8dd18e8dc30be6697f36aa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.nib rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\nib_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.nib\ = "nib_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2664 rundll32.exe 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2664 2992 cmd.exe 29 PID 2992 wrote to memory of 2664 2992 cmd.exe 29 PID 2992 wrote to memory of 2664 2992 cmd.exe 29 PID 2664 wrote to memory of 2584 2664 rundll32.exe 31 PID 2664 wrote to memory of 2584 2664 rundll32.exe 31 PID 2664 wrote to memory of 2584 2664 rundll32.exe 31 PID 2664 wrote to memory of 2584 2664 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\01J-lp-oVM-view-Ze5-6b-2t3.nib1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\01J-lp-oVM-view-Ze5-6b-2t3.nib2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\01J-lp-oVM-view-Ze5-6b-2t3.nib"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5857fdb10d3ca9ee221004405656d42ab
SHA1d5443268d692828b23953e1dba35f9917e020a50
SHA256362468adc15d188d8c39fdaccccfe8aa4051dfbba0eef6fa361c066ce8615adc
SHA51253731e77f7d4451d2195dfe81ab01f12c60351de02d67de386ac48f88167fb15a350f7575b453318eee2981fde80c925ead5f431a8ab352d6c5742afce531308