Overview
overview
3Static
static
1NO-EXTENSI...10.zip
windows7-x64
1NO-EXTENSI...10.zip
windows10-2004-x64
1Payload/Ap...Apollo
macos-10.15-amd64
1Payload/Ap...ts.xml
windows7-x64
1Payload/Ap...ts.xml
windows10-2004-x64
1Payload/Ap...2x.png
windows7-x64
3Payload/Ap...2x.png
windows10-2004-x64
3Payload/Ap...ad.png
windows7-x64
3Payload/Ap...ad.png
windows10-2004-x64
3Payload/Ap...ts.car
windows7-x64
3Payload/Ap...ts.car
windows10-2004-x64
3Payload/Ap...et.xml
windows7-x64
1Payload/Ap...et.xml
windows10-2004-x64
1Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap...t3.nib
windows7-x64
3Payload/Ap...t3.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...VM.nib
windows7-x64
3Payload/Ap...VM.nib
windows10-2004-x64
3Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...ll.nib
windows7-x64
3Payload/Ap...ll.nib
windows10-2004-x64
3Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Payload/Ap...orking
macos-10.15-amd64
1Payload/Ap....plist
windows7-x64
3Payload/Ap....plist
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
NO-EXTENSIONS_Apollo-1.15.11_improvedcustomapi-1.0.10.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
NO-EXTENSIONS_Apollo-1.15.11_improvedcustomapi-1.0.10.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Payload/Apollo.app/Apollo
Resource
macos-20240214-en
Behavioral task
behavioral4
Sample
Payload/Apollo.app/ApolloIntents.xml
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
Payload/Apollo.app/ApolloIntents.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Payload/Apollo.app/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
Payload/Apollo.app/AppIcon76x76@2x~ipad.png
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
Payload/Apollo.app/AppIcon76x76@2x~ipad.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
Payload/Apollo.app/Assets.car
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
Payload/Apollo.app/Assets.car
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
Payload/Apollo.app/AthenaWidget.xml
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
Payload/Apollo.app/AthenaWidget.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
Payload/Apollo.app/BanDurationTableViewCell.nib
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
Payload/Apollo.app/BanDurationTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/UIViewController-01J-lp-oVM.nib
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/UIViewController-01J-lp-oVM.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
Payload/Apollo.app/BrightnessThresholdTableViewCell.nib
Resource
win7-20240220-en
Behavioral task
behavioral23
Sample
Payload/Apollo.app/BrightnessThresholdTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
Payload/Apollo.app/CommentColorThemes.plist
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
Payload/Apollo.app/CommentColorThemes.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
Payload/Apollo.app/DatePickerTableViewCell.nib
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
Payload/Apollo.app/DatePickerTableViewCell.nib
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
Payload/Apollo.app/Defaults.plist
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
Payload/Apollo.app/Defaults.plist
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/AFNetworking
Resource
macos-20240214-en
Behavioral task
behavioral31
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/Info.plist
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Payload/Apollo.app/Frameworks/AFNetworking.framework/Info.plist
Resource
win10v2004-20240226-en
General
-
Target
Payload/Apollo.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
-
Size
258B
-
MD5
c35c440d4928d20d6919478391910ded
-
SHA1
9f6b7c82c0e97c4e979211b7d69ec84094714f15
-
SHA256
1f255d5cc53b531e3f29a9406a8df49a958e2bf9443d3e20bd8374f707f7d5c8
-
SHA512
0e34f6c6e73e76066094dc4d30d5493e54d4f94f1461d2c25a5b46736edbe237ecc9001e40b8b52f4fa544f40c54b7ebd4ec99b6384792e9cf91b420f6453c29
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.plist\ = "plist_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.plist rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\plist_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 AcroRd32.exe 2596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\Info.plist1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\Info.plist2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Apollo.app\Base.lproj\LaunchScreen.storyboardc\Info.plist"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59f7ca11b96b6430dc4f57466fb7f4ede
SHA1640ecc8cc4ff4f96dcc55670e0cfedee8c6d74e3
SHA256612575f64d60cff6ebd1ef52cc3a662e953b78db6039b0e97b345af950679a6e
SHA512067992d077b47c7be855004ca69847f705de3b4262b1e774a5593d67ab59006d9e5dd60f565a5b3aaffb63257cdfca679c1b8f22f2cc48fc6c7efa6b3b8b2cf8