Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
apollo.exe

Overview

General Information

Sample name:apollo.exe
Analysis ID:1526396
MD5:bcbb1cc9f78c21384ed244b1c57711ca
SHA1:ba62c0d50779702aca9a5ba9df2d81107aacf89b
SHA256:0c634e9765c76172252acc472e1a66ea7799bfcfbeca8764b3ad5364042b312d
Tags:exeuser-rado
Infos:

Detection

Apollo Agent
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Apollo Agent
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Yara detected Costura Assembly Loader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • apollo.exe (PID: 7556 cmdline: "C:\Users\user\Desktop\apollo.exe" MD5: BCBB1CC9F78C21384ED244B1C57711CA)
    • conhost.exe (PID: 7564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
apollo.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ApolloAgentYara detected Apollo AgentJoe Security
        00000000.00000002.4217866938.000001525EDF0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.4216733237.0000015256621000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000002.4216733237.00000152567D3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 3 entries
              SourceRuleDescriptionAuthorStrings
              0.2.apollo.exe.15244f30000.4.raw.unpackJoeSecurity_ApolloAgentYara detected Apollo AgentJoe Security
                0.2.apollo.exe.15244f30000.4.unpackJoeSecurity_ApolloAgentYara detected Apollo AgentJoe Security
                  0.2.apollo.exe.1525edf0000.15.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.apollo.exe.15256629ac0.14.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      0.2.apollo.exe.15256805a10.13.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                        Click to see the 4 entries
                        No Sigma rule has matched
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: apollo.exeReversingLabs: Detection: 44%
                        Source: apollo.exeVirustotal: Detection: 41%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                        Source: apollo.exeJoe Sandbox ML: detected
                        Source: apollo.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: apollo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/EncryptedFileStore/obj/Release/net451/EncryptedFileStore.pdbSHA256w source: apollo.exe, 00000000.00000002.4215687848.000001524665A000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246643000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215578898.0000015244FE0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/ApolloInterop/obj/Release/net451/ApolloInterop.pdbSHA256 source: apollo.exe, 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Process/obj/Release/net451/Process.pdbSHA256( source: apollo.exe, 00000000.00000002.4215105934.0000015244E60000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/KerberosTickets/obj/Release/net451/KerberosTickets.pdbSHA256 source: apollo.exe, 00000000.00000002.4215429692.0000015244F90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/PSKCrypto/obj/Release/net451/PSKCryptography.pdbSHA256t source: apollo.exe, 00000000.00000002.4215182470.0000015244E90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/SimpleResolver/obj/Release/net451/SimpleResolver.pdbSHA256 source: apollo.exe, 00000000.00000002.4215495956.0000015244FC0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Process/obj/Release/net451/Process.pdb source: apollo.exe, 00000000.00000002.4215105934.0000015244E60000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/PSKCrypto/obj/Release/net451/PSKCryptography.pdb source: apollo.exe, 00000000.00000002.4215182470.0000015244E90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/ApolloInterop/obj/Release/net451/ApolloInterop.pdb source: apollo.exe, 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Injection/obj/Release/net451/Injection.pdb source: apollo.exe, 00000000.00000002.4215394399.0000015244F80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Injection/obj/Release/net451/Injection.pdbSHA256 source: apollo.exe, 00000000.00000002.4215394399.0000015244F80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/HttpProfile/obj/Release/net451/HttpProfile.pdbSHA256 source: apollo.exe, 00000000.00000002.4215146572.0000015244E80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/SimpleResolver/obj/Release/net451/SimpleResolver.pdb source: apollo.exe, 00000000.00000002.4215495956.0000015244FC0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/KerberosTickets/obj/Release/net451/KerberosTickets.pdb source: apollo.exe, 00000000.00000002.4215429692.0000015244F90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/HttpProfile/obj/Release/net451/HttpProfile.pdb source: apollo.exe, 00000000.00000002.4215146572.0000015244E80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Apollo/obj/Release/net451/Apollo.pdb source: apollo.exe
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/EncryptedFileStore/obj/Release/net451/EncryptedFileStore.pdb source: apollo.exe, 00000000.00000002.4215687848.000001524665A000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246643000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215578898.0000015244FE0000.00000004.08000000.00040000.00000000.sdmp
                        Source: apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org
                        Source: apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/ApolloInterop.Structs.MythicStructs
                        Source: apollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: apollo.exeString found in binary or memory: https://192.168.1.217
                        Source: apollo.exe, 00000000.00000002.4215687848.000001524675D000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217(
                        Source: apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217/dato
                        Source: apollo.exe, 00000000.00000002.4218250603.000001525F005000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217/to
                        Source: apollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217:4
                        Source: apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217:443
                        Source: apollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://192.168.1.217:4432
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443

                        System Summary

                        barindex
                        Source: Yara matchFile source: 0.2.apollo.exe.15244f30000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.15244f30000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: apollo.exe PID: 7556, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\apollo.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B70D1D00_2_00007FFD9B70D1D0
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B70BF4E0_2_00007FFD9B70BF4E
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B70D2ED0_2_00007FFD9B70D2ED
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B7045210_2_00007FFD9B704521
                        Source: apollo.exe, 00000000.00000002.4215687848.000001524665A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEncryptedFileStore.dllF vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEncryptedFileStore.dllF vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215394399.0000015244F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameInjection.dll4 vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215429692.0000015244F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKerberosTickets.dll@ vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215495956.0000015244FC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleResolver.dll> vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215146572.0000015244E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameHttpProfile.dll8 vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215182470.0000015244E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePSKCryptography.dll@ vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215105934.0000015244E60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameProcess.dll0 vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215687848.0000015246643000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEncryptedFileStore.dllF vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215578898.0000015244FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEncryptedFileStore.dllF vs apollo.exe
                        Source: apollo.exe, 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameApolloInterop.dll< vs apollo.exe
                        Source: apollo.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: apollo.exe, TaskManager.csTask registration methods: 'CreateTaskingMessage'
                        Source: 0.2.apollo.exe.15256805a10.13.raw.unpack, load.csTask registration methods: 'CreateTasking'
                        Source: 0.2.apollo.exe.15256629ac0.14.raw.unpack, load.csTask registration methods: 'CreateTasking'
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, QueueUserAPC.csSuspicious method names: .QueueUserAPC.Inject
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.csSuspicious method names: .NtCreateThreadEx.Inject
                        Source: 0.2.apollo.exe.15244e60000.1.raw.unpack, SacrificialProcess.csSuspicious method names: .SacrificialProcess.Inject
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.csSuspicious method names: .CreateRemoteThread.Inject
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.csSuspicious method names: .InjectionManager.GetCurrentTechnique
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.csSuspicious method names: .InjectionManager.SetTechnique
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.csSuspicious method names: .InjectionManager.LoadTechnique
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.csSuspicious method names: .InjectionManager.GetTechniques
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.csSuspicious method names: .InjectionManager.CreateInstance
                        Source: classification engineClassification label: mal84.troj.evad.winEXE@2/0@0/1
                        Source: C:\Users\user\Desktop\apollo.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7564:120:WilError_03
                        Source: apollo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: apollo.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\apollo.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: apollo.exeReversingLabs: Detection: 44%
                        Source: apollo.exeVirustotal: Detection: 41%
                        Source: unknownProcess created: C:\Users\user\Desktop\apollo.exe "C:\Users\user\Desktop\apollo.exe"
                        Source: C:\Users\user\Desktop\apollo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: napinsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: pnrpnsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: wshbth.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: nlaapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: winrnr.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: apollo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: apollo.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: apollo.exeStatic file information: File size 2095616 > 1048576
                        Source: apollo.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1ff000
                        Source: apollo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: apollo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/EncryptedFileStore/obj/Release/net451/EncryptedFileStore.pdbSHA256w source: apollo.exe, 00000000.00000002.4215687848.000001524665A000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246643000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215578898.0000015244FE0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/ApolloInterop/obj/Release/net451/ApolloInterop.pdbSHA256 source: apollo.exe, 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Process/obj/Release/net451/Process.pdbSHA256( source: apollo.exe, 00000000.00000002.4215105934.0000015244E60000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/KerberosTickets/obj/Release/net451/KerberosTickets.pdbSHA256 source: apollo.exe, 00000000.00000002.4215429692.0000015244F90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/PSKCrypto/obj/Release/net451/PSKCryptography.pdbSHA256t source: apollo.exe, 00000000.00000002.4215182470.0000015244E90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/SimpleResolver/obj/Release/net451/SimpleResolver.pdbSHA256 source: apollo.exe, 00000000.00000002.4215495956.0000015244FC0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Process/obj/Release/net451/Process.pdb source: apollo.exe, 00000000.00000002.4215105934.0000015244E60000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/PSKCrypto/obj/Release/net451/PSKCryptography.pdb source: apollo.exe, 00000000.00000002.4215182470.0000015244E90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/ApolloInterop/obj/Release/net451/ApolloInterop.pdb source: apollo.exe, 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Injection/obj/Release/net451/Injection.pdb source: apollo.exe, 00000000.00000002.4215394399.0000015244F80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Injection/obj/Release/net451/Injection.pdbSHA256 source: apollo.exe, 00000000.00000002.4215394399.0000015244F80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/HttpProfile/obj/Release/net451/HttpProfile.pdbSHA256 source: apollo.exe, 00000000.00000002.4215146572.0000015244E80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/SimpleResolver/obj/Release/net451/SimpleResolver.pdb source: apollo.exe, 00000000.00000002.4215495956.0000015244FC0000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/KerberosTickets/obj/Release/net451/KerberosTickets.pdb source: apollo.exe, 00000000.00000002.4215429692.0000015244F90000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/HttpProfile/obj/Release/net451/HttpProfile.pdb source: apollo.exe, 00000000.00000002.4215146572.0000015244E80000.00000004.08000000.00040000.00000000.sdmp
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/Apollo/obj/Release/net451/Apollo.pdb source: apollo.exe
                        Source: Binary string: /tmp/tmp70mibbdd19136689-735c-4fa8-8aca-762da6751eee/EncryptedFileStore/obj/Release/net451/EncryptedFileStore.pdb source: apollo.exe, 00000000.00000002.4215687848.000001524665A000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.0000015246643000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215578898.0000015244FE0000.00000004.08000000.00040000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: apollo.exe, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                        Source: apollo.exe, TaskManager.cs.Net Code: LoadTaskModule System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.apollo.exe.15256805a10.13.raw.unpack, wmiexecute.cs.Net Code: Start
                        Source: 0.2.apollo.exe.15256805a10.13.raw.unpack, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, InjectionManager.cs.Net Code: LoadTechnique System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.apollo.exe.15256629ac0.14.raw.unpack, wmiexecute.cs.Net Code: Start
                        Source: 0.2.apollo.exe.15256629ac0.14.raw.unpack, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                        Source: Yara matchFile source: apollo.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.apollo.exe.1525edf0000.15.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.15256629ac0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.15256805a10.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.15256805a10.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.15256629ac0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.apollo.exe.1525edf0000.15.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.apollo.exe.15244780000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4217866938.000001525EDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4216733237.0000015256621000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4216733237.00000152567D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1755800170.0000015244782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: apollo.exe PID: 7556, type: MEMORYSTR
                        Source: apollo.exeStatic PE information: 0x8F692F2D [Fri Mar 30 15:07:25 2046 UTC]
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B716B12 pushad ; ret 0_2_00007FFD9B716BCD
                        Source: C:\Users\user\Desktop\apollo.exeCode function: 0_2_00007FFD9B7000AD pushad ; iretd 0_2_00007FFD9B7000C1
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeMemory allocated: 15244E50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeMemory allocated: 1525E620000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599874Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599765Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599655Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599546Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599328Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599218Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599109Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598999Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598890Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598781Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598671Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598562Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598453Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598343Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598234Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598124Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598015Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597900Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597796Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597687Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597578Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597468Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597359Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597249Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597140Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597031Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596921Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596812Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596703Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596592Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596374Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596265Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596046Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595718Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595609Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595499Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595390Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595281Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595171Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595062Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeWindow / User API: threadDelayed 1698Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeWindow / User API: threadDelayed 435Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeWindow / User API: threadDelayed 7669Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 7636Thread sleep time: -43500s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -600000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599874s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599765s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599655s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599546s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599437s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599328s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599218s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -599109s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598999s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598890s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598781s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598671s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598562s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598453s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598343s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598234s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598124s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -598015s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597900s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597796s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597687s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597578s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597468s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597359s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597249s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597140s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -597031s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596921s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596812s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596703s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596592s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596484s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596374s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596265s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596156s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -596046s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595937s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595828s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595718s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595609s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595499s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595390s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595281s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595171s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exe TID: 8148Thread sleep time: -595062s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599874Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599765Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599655Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599546Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599437Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599328Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599218Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 599109Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598999Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598890Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598781Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598671Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598562Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598453Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598343Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598234Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598124Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 598015Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597900Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597796Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597687Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597578Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597468Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597359Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597249Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597140Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 597031Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596921Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596812Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596703Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596592Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596374Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596265Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 596046Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595718Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595609Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595499Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595390Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595281Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595171Jump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeThread delayed: delay time: 595062Jump to behavior
                        Source: apollo.exe, 00000000.00000002.4218250603.000001525F005000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\apollo.exeProcess information queried: ProcessInformationJump to behavior

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\Desktop\apollo.exeProcess Stats: CPU usage > 42% for more than 60s
                        Source: C:\Users\user\Desktop\apollo.exeProcess token adjusted: DebugJump to behavior
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Users\user\Desktop\apollo.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.cs.Net Code: GetFunctionPointers contains injection code
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.cs.Net Code: Inject contains injection code
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.cs.Net Code: Setup contains injection code
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.cs.Net Code: Inject contains injection code
                        Source: apollo.exe, IdentityManager.csReference to suspicious API methods: _OpenProcessToken(handle, 983551u, out _originalPrimaryToken)
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.csReference to suspicious API methods: base._agent.GetApi().GetLibraryFunction<VirtualAllocEx>(Library.KERNEL32, "VirtualAllocEx", true, true)
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.csReference to suspicious API methods: base._agent.GetApi().GetLibraryFunction<WriteProcessMemory>(Library.KERNEL32, "WriteProcessMemory", true, true)
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.csReference to suspicious API methods: base._agent.GetApi().GetLibraryFunction<CRT>(Library.KERNEL32, "CreateRemoteThread", true, true)
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, CreateRemoteThread.csReference to suspicious API methods: base._agent.GetApi().GetLibraryFunction<VirtualProtectEx>(Library.KERNEL32, "VirtualProtectEx", true, true)
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.csReference to suspicious API methods: _syscall.MarshalNtSyscall<NtAllocateVirtualMemory>("NtAllocateVirtualMemory")
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.csReference to suspicious API methods: _syscall.MarshalNtSyscall<NtProtectVirtualMemory>("NtProtectVirtualMemory")
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.csReference to suspicious API methods: _syscall.MarshalNtSyscall<NtCreateThreadExDelegate>("NtCreateThreadEx")
                        Source: 0.2.apollo.exe.15244f80000.5.raw.unpack, NtCreateThreadEx.csReference to suspicious API methods: _syscall.MarshalNtSyscall<NtWriteVirtualMemory>("NtWriteVirtualMemory")
                        Source: C:\Users\user\Desktop\apollo.exeQueries volume information: C:\Users\user\Desktop\apollo.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ValueTuple\v4.0_4.0.0.0__cc7b13ffcd2ddd51\System.ValueTuple.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\apollo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Disable or Modify Tools
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        12
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        132
                        Virtualization/Sandbox Evasion
                        LSASS Memory11
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable Media1
                        Application Layer Protocol
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        11
                        Process Injection
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Obfuscated Files or Information
                        NTDS132
                        Virtualization/Sandbox Evasion
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Software Packing
                        LSA Secrets1
                        Application Window Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Timestomp
                        Cached Domain Credentials12
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        apollo.exe45%ReversingLabsByteCode-MSIL.Trojan.ApolloMarte
                        apollo.exe41%VirustotalBrowse
                        apollo.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://192.168.1.217:4430%VirustotalBrowse
                        https://192.168.1.217/dato0%VirustotalBrowse
                        http://schemas.datacontract.org0%VirustotalBrowse
                        http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                        https://192.168.1.2170%VirustotalBrowse
                        http://schemas.datacontract.org/2004/07/ApolloInterop.Structs.MythicStructs0%VirustotalBrowse
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://192.168.1.217:4432apollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://192.168.1.217/datoapollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://192.168.1.217/toapollo.exe, 00000000.00000002.4218250603.000001525F005000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://192.168.1.217(apollo.exe, 00000000.00000002.4215687848.000001524675D000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://192.168.1.217:443apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.00000152467C6000.00000004.00000800.00020000.00000000.sdmp, apollo.exe, 00000000.00000002.4215687848.000001524677C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.datacontract.orgapollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.datacontract.org/2004/07/ApolloInterop.Structs.MythicStructsapollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.datacontract.org/2004/07/apollo.exe, 00000000.00000002.4215687848.00000152466FB000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameapollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://192.168.1.217apollo.exefalseunknown
                              https://192.168.1.217:4apollo.exe, 00000000.00000002.4215687848.0000015246668000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                IP
                                192.168.1.217
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1526396
                                Start date and time:2024-10-05 15:06:06 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 44s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:apollo.exe
                                Detection:MAL
                                Classification:mal84.troj.evad.winEXE@2/0@0/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 93%
                                • Number of executed functions: 9
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                09:07:40API Interceptor12610935x Sleep call for process: apollo.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.990237820661335
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:apollo.exe
                                File size:2'095'616 bytes
                                MD5:bcbb1cc9f78c21384ed244b1c57711ca
                                SHA1:ba62c0d50779702aca9a5ba9df2d81107aacf89b
                                SHA256:0c634e9765c76172252acc472e1a66ea7799bfcfbeca8764b3ad5364042b312d
                                SHA512:cdde09b72162658f3b5d057e0943d29c40d315ef3df2a32aaf1a0f828f291174eaa8355bd03fad3be094276677d4aa220783258fc10a54e59c5d26b884e438b0
                                SSDEEP:49152:/kqXfd+/9AqbXHeWQmVNDfHOWHLwNveZvgPydGKf+DrIEjR6gg5tHu+kP:/kqXf0FfbXHRNVlPwx4vgPydGq+Dd6FU
                                TLSH:C6A533116BD5404CC773467EA47937221EBCB92998ECD3CF0645BA670ACFB440ACA7A7
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-/i..........."...0............... .. ........@.. .......................` ...........`................................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x600ebe
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows cui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x8F692F2D [Fri Mar 30 15:07:25 2046 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x200e6c0x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2020000x59c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2040000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x200dc00x38.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x1feec40x1ff000eba74d5879033198caeef383e77c1c8aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x2020000x59c0x600407750d95e6d610ec4957be4145f52f5False0.4134114583333333data4.032813732010763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x2040000xc0x2000be6c947e4a6da18ecf1fc21ff46be7cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x2020900x30cdata0.4282051282051282
                                RT_MANIFEST0x2023ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 5, 2024 15:07:09.308398962 CEST49730443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:09.308512926 CEST44349730192.168.1.217192.168.2.4
                                Oct 5, 2024 15:07:09.308605909 CEST49730443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:09.322407007 CEST49730443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:09.322441101 CEST44349730192.168.1.217192.168.2.4
                                Oct 5, 2024 15:07:52.514199018 CEST44349730192.168.1.217192.168.2.4
                                Oct 5, 2024 15:07:52.514312029 CEST49730443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:52.541815042 CEST49730443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:52.541881084 CEST44349730192.168.1.217192.168.2.4
                                Oct 5, 2024 15:07:52.558556080 CEST49737443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:52.558607101 CEST44349737192.168.1.217192.168.2.4
                                Oct 5, 2024 15:07:52.558681011 CEST49737443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:52.559076071 CEST49737443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:07:52.559097052 CEST44349737192.168.1.217192.168.2.4
                                Oct 5, 2024 15:08:35.321324110 CEST44349737192.168.1.217192.168.2.4
                                Oct 5, 2024 15:08:35.321384907 CEST49737443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:08:35.322129011 CEST49737443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:08:35.322145939 CEST44349737192.168.1.217192.168.2.4
                                Oct 5, 2024 15:08:36.377854109 CEST49964443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:08:36.377902031 CEST44349964192.168.1.217192.168.2.4
                                Oct 5, 2024 15:08:36.378598928 CEST49964443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:08:36.378765106 CEST49964443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:08:36.378778934 CEST44349964192.168.1.217192.168.2.4
                                Oct 5, 2024 15:09:19.171803951 CEST44349964192.168.1.217192.168.2.4
                                Oct 5, 2024 15:09:19.171891928 CEST49964443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:09:19.172574043 CEST49964443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:09:19.172601938 CEST44349964192.168.1.217192.168.2.4
                                Oct 5, 2024 15:09:19.173222065 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:09:19.173322916 CEST44350005192.168.1.217192.168.2.4
                                Oct 5, 2024 15:09:19.173412085 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:09:19.173710108 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:09:19.173748970 CEST44350005192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:01.946881056 CEST44350005192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:01.948409081 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:01.948409081 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:02.370697975 CEST50005443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:02.370776892 CEST44350005192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:02.990199089 CEST50006443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:02.990302086 CEST44350006192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:02.990382910 CEST50006443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:02.990669966 CEST50006443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:02.990706921 CEST44350006192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:45.743824959 CEST44350006192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:45.743923903 CEST50006443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:45.746144056 CEST50006443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:45.746192932 CEST44350006192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:45.757035017 CEST50007443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:45.757086039 CEST44350007192.168.1.217192.168.2.4
                                Oct 5, 2024 15:10:45.757141113 CEST50007443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:45.757808924 CEST50007443192.168.2.4192.168.1.217
                                Oct 5, 2024 15:10:45.757824898 CEST44350007192.168.1.217192.168.2.4

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:09:07:05
                                Start date:05/10/2024
                                Path:C:\Users\user\Desktop\apollo.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\apollo.exe"
                                Imagebase:0x15244780000
                                File size:2'095'616 bytes
                                MD5 hash:BCBB1CC9F78C21384ED244B1C57711CA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4215687848.0000015246621000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_ApolloAgent, Description: Yara detected Apollo Agent, Source: 00000000.00000002.4215252791.0000015244F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4217866938.000001525EDF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4216733237.0000015256621000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4216733237.00000152567D3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1755800170.0000015244782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:09:07:05
                                Start date:05/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.4%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:9
                                  Total number of Limit Nodes:0
                                  execution_graph 10528 7ffd9b70369a 10529 7ffd9b70a900 GetProcAddressForCaller 10528->10529 10531 7ffd9b70aa46 10529->10531 10536 7ffd9b70b751 10537 7ffd9b70b75d GetTokenInformation 10536->10537 10539 7ffd9b70b86a 10537->10539 10532 7ffd9b70a24c 10534 7ffd9b70a2a4 LoadLibraryA 10532->10534 10535 7ffd9b70a3b4 10534->10535

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: |bV$(|bV$0|bV$8|bV$@|bV$H|bV$I$P|bV$X|bV$_$`|bV$h|bV$iM_H$p9bV$uM_$x9bV
                                  • API String ID: 0-2104280195
                                  • Opcode ID: 919e720851ff13a718f62658be39f7ddd31080656e1a5892d3b6e514a977c2cd
                                  • Instruction ID: fb6078f7abb91242b8fc66a17f818641259264243fa052bed949532d6ba62a91
                                  • Opcode Fuzzy Hash: 919e720851ff13a718f62658be39f7ddd31080656e1a5892d3b6e514a977c2cd
                                  • Instruction Fuzzy Hash: E8422771A0F7C55FD3A697B848266A93FE0EF82620B4A02FFD489CB1F3D91D18468751

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: |bV$(|bV$0|bV$8|bV$@|bV$H|bV$P|bV$X|bV$`|bV$h|bV$iM_H$p9bV$tM_$x9bV
                                  • API String ID: 0-62780701
                                  • Opcode ID: 0c4238f7d37a18e042d61cb4a1d499bfe6641affa6a027a9ee42e28feb5d9940
                                  • Instruction ID: eab3ed2344356ec68bbe6303cd483c4c288cd09a8f11dde73aaf712ea2cac9ff
                                  • Opcode Fuzzy Hash: 0c4238f7d37a18e042d61cb4a1d499bfe6641affa6a027a9ee42e28feb5d9940
                                  • Instruction Fuzzy Hash: 4C323671A0FBC55FD3A697B848266597EE0EF86630B4A02EED0C9C75F3DA1D1842C711
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P9bV$WVSH$X9bV$`9bV$cM_H$h9bV$vM_^$wM_^
                                  • API String ID: 0-154231056
                                  • Opcode ID: fadb77335e18c16981088b8e207a1c45dde166af283bac7a2c65e29f20201b75
                                  • Instruction ID: e6c712958e82cae9f42c61c18383130e843c8bb93a1f1abee7863dab622c45e8
                                  • Opcode Fuzzy Hash: fadb77335e18c16981088b8e207a1c45dde166af283bac7a2c65e29f20201b75
                                  • Instruction Fuzzy Hash: 81D2E622B0E6964FE726B77CA4B15EA3BE0DF42224B4902F7D0DDCA0E7DD1D68468351
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8044fc3e84b71e3da9c32a75b42ecae01bdc3f263d04eb630b0d58a3cd5fe7e3
                                  • Instruction ID: ffb0d2a70f9cf956157a21b918b7d71621fda53ac5423fd453862a335087717a
                                  • Opcode Fuzzy Hash: 8044fc3e84b71e3da9c32a75b42ecae01bdc3f263d04eb630b0d58a3cd5fe7e3
                                  • Instruction Fuzzy Hash: 7191A331B19A494FD798EB6C84A9A75B3E2EF99300F4542BAE05EC32F7DD24AC418741

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 968 7ffd9b70a24c-7ffd9b70a2dc 971 7ffd9b70a2de-7ffd9b70a305 968->971 972 7ffd9b70a34f-7ffd9b70a3b2 LoadLibraryA 968->972 971->972 975 7ffd9b70a307-7ffd9b70a30a 971->975 976 7ffd9b70a3b4 972->976 977 7ffd9b70a3ba-7ffd9b70a3f6 call 7ffd9b70a412 972->977 978 7ffd9b70a344-7ffd9b70a34c 975->978 979 7ffd9b70a30c-7ffd9b70a31f 975->979 976->977 986 7ffd9b70a3fd-7ffd9b70a411 977->986 987 7ffd9b70a3f8 977->987 978->972 981 7ffd9b70a321 979->981 982 7ffd9b70a323-7ffd9b70a336 979->982 981->982 982->982 984 7ffd9b70a338-7ffd9b70a340 982->984 984->978 987->986
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: UAWA
                                  • API String ID: 1029625771-1492024814
                                  • Opcode ID: 01ceb1b1647cb389bc0a861ba261833e872e690c15c41253cb4fccbae8860fa5
                                  • Instruction ID: 8cb68f37577506c3ddcc634d339258e9582f526f15ccc0623dfb5d8b6581057a
                                  • Opcode Fuzzy Hash: 01ceb1b1647cb389bc0a861ba261833e872e690c15c41253cb4fccbae8860fa5
                                  • Instruction Fuzzy Hash: 93519230618A4D8FEB98EF18D8557F977E1FB58310F10426EE84EC72A2DF75A9418B81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 988 7ffd9b70b751-7ffd9b70b7a8 993 7ffd9b70b7aa-7ffd9b70b7f9 988->993 994 7ffd9b70b7fb-7ffd9b70b868 GetTokenInformation 988->994 993->994 998 7ffd9b70b870-7ffd9b70b8a1 994->998 999 7ffd9b70b86a 994->999 999->998
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID: InformationToken
                                  • String ID: UAWA
                                  • API String ID: 4114910276-1492024814
                                  • Opcode ID: 5cc67f1facdf02e50c54f796fe33527afac7667345474655cadd538508fe5f12
                                  • Instruction ID: e7f4972868c7572d34a7f73c41275de7bbeb5907b1b248e81c5dc75d551cbf50
                                  • Opcode Fuzzy Hash: 5cc67f1facdf02e50c54f796fe33527afac7667345474655cadd538508fe5f12
                                  • Instruction Fuzzy Hash: 80411831A0C75C4FDB18EB9898556F97BE0EF55320F0442BFE08987293DE34A9458782
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID: AddressCallerProc
                                  • String ID:
                                  • API String ID: 2663294120-0
                                  • Opcode ID: 5084f8e8208cc0c636c365bf0eb42846343eaae11520d1760c86361bdfd3e580
                                  • Instruction ID: 770682d3cf7768a8b3adc77eb3a9bdc0a1b73806cbe7c3b295628811a8028fcd
                                  • Opcode Fuzzy Hash: 5084f8e8208cc0c636c365bf0eb42846343eaae11520d1760c86361bdfd3e580
                                  • Instruction Fuzzy Hash: 4451A330618A4D4FEB68EF18D85A7F977D1FB59310F11422AE85EC32A1DF74E9418B81
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 766c1a0fd03194ae377e52d2e185e6a37cfa2d46f4409eb42f76073dede2098b
                                  • Instruction ID: 62237247b92105c3a1ece0b431ec2dea9b6ae662077ced1fd8ef890e8b7da1d7
                                  • Opcode Fuzzy Hash: 766c1a0fd03194ae377e52d2e185e6a37cfa2d46f4409eb42f76073dede2098b
                                  • Instruction Fuzzy Hash: ED518230608A4D8FEB98EF18D8567F977E1FB58310F10422EE84EC32A1DF75A9418B81
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218973465.00007FFD9B700000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B700000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b700000_apollo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 766c1a0fd03194ae377e52d2e185e6a37cfa2d46f4409eb42f76073dede2098b
                                  • Instruction ID: 62237247b92105c3a1ece0b431ec2dea9b6ae662077ced1fd8ef890e8b7da1d7
                                  • Opcode Fuzzy Hash: 766c1a0fd03194ae377e52d2e185e6a37cfa2d46f4409eb42f76073dede2098b
                                  • Instruction Fuzzy Hash: ED518230608A4D8FEB98EF18D8567F977E1FB58310F10422EE84EC32A1DF75A9418B81