Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Apocalуps...se.exe
windows7-x64
1Apocalуps...se.exe
windows10-2004-x64
10Apocalуps...ig.dll
windows7-x64
3Apocalуps...ig.dll
windows10-2004-x64
3Apocalуps...ct.dll
windows7-x64
1Apocalуps...ct.dll
windows10-2004-x64
1Apocalуps...in.dll
windows7-x64
3Apocalуps...in.dll
windows10-2004-x64
3Apocalуps...nu.dll
windows7-x64
1Apocalуps...nu.dll
windows10-2004-x64
1Apocalуps...up.dll
windows7-x64
3Apocalуps...up.dll
windows10-2004-x64
3Apocalуps...wh.dll
windows7-x64
1Apocalуps...wh.dll
windows10-2004-x64
1Apocalуpsе/Core.dll
windows7-x64
1Apocalуpsе/Core.dll
windows10-2004-x64
1Apocalуpsе/Data.dll
windows7-x64
1Apocalуpsе/Data.dll
windows10-2004-x64
1Apocalуps...ng.dll
windows7-x64
1Apocalуps...ng.dll
windows10-2004-x64
1Analysis
-
max time kernel
101s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
Apocalуpsе/Apocalypse.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Apocalуpsе/Apocalypse.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Apocalуpsе/Configs/config.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Apocalуpsе/Configs/config.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Apocalуpsе/Configs/inject.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Apocalуpsе/Configs/inject.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Apocalуpsе/Configs/main.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Apocalуpsе/Configs/main.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Apocalуpsе/Configs/menu.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Apocalуpsе/Configs/menu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Apocalуpsе/Configs/up.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Apocalуpsе/Configs/up.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Apocalуpsе/Configs/wh.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Apocalуpsе/Configs/wh.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Apocalуpsе/Core.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Apocalуpsе/Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Apocalуpsе/Data.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Apocalуpsе/Data.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Apocalуpsе/Drawing.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Apocalуpsе/Drawing.dll
Resource
win10v2004-20240802-en
General
-
Target
Apocalуpsе/Apocalypse.exe
-
Size
58.6MB
-
MD5
cd61aabe34ccd3da0ca94248b1c61b83
-
SHA1
f629095066fe5b7767fb8319b93dadab8480532d
-
SHA256
ce08a234a253e58605ccfa28860ee08a213464e6b7467cdf7ed2157195008ed5
-
SHA512
cee0220bc469dfd4ad5cd9a8a9feaecb66c1b4855f103d58fe3811886bb853bd7866bb7db2fb67ec7a95712030348f3e7bf1fdc5e20bbe1017a11e1568091338
-
SSDEEP
393216:EHPp6fICo8749CrOE7MC8+6wSNvAqp3XUC:sPp6fIp8748qEZ8+61eaXU
Malware Config
Extracted
lumma
https://disappearsodsz.shop/api
https://potentioallykeos.shop/api
https://interactiedovspm.shop/api
https://charecteristicdxp.shop/api
https://cagedwifedsozm.shop/api
https://deicedosmzj.shop/api
https://southedhiscuso.shop/api
https://consciousourwi.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 216 set thread context of 4752 216 Apocalypse.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 Apocalypse.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 216 wrote to memory of 4752 216 Apocalypse.exe 94 PID 216 wrote to memory of 4752 216 Apocalypse.exe 94 PID 216 wrote to memory of 4752 216 Apocalypse.exe 94 PID 216 wrote to memory of 4752 216 Apocalypse.exe 94 PID 216 wrote to memory of 4752 216 Apocalypse.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Apocalуpsе\Apocalypse.exe"C:\Users\Admin\AppData\Local\Temp\Apocalуpsе\Apocalypse.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:4752
-