Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240410-en
  • resource tags

    arch:amd64arch:i386image:macos-20240410-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    16-04-2024 21:57

General

  • Target

    Bambu_Studio_win-v01.08.04.51.exe

  • Size

    216.6MB

  • MD5

    dfd4a19de50a68477edac8dbb25faf9a

  • SHA1

    f5d117a3550adee70f3ff2edbf65b375334c79f6

  • SHA256

    f911e04176476439bf4f10b4a476627bb3e401025b225eefcb529d8a7d25f5e6

  • SHA512

    45a1da9a8182a9e78e8b688e4123ea83ad5ffdd1a17d8a9e86d298b4b01daa5b993d873491859f77c082aedfab67beb72dee64527aff436d0e3198a39f1630e6

  • SSDEEP

    3145728:Fz/Hlx62MMm5DdD8q8fbHSb27hjm/n51hqX0ckUDfet0+kfJ4mNoFYeS3A+skw4x:dtxpMMmJ59G+MM5LqX0chD8ayYeF+

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /usr/libexec/xpcproxy
    xpcproxy com.apple.pluginkit.pkreporter
    1⤵
      PID:478
    • /bin/sh
      sh -c "sudo /bin/zsh -c \"/Users/run/Bambu_Studio_win-v01.08.04.51.exe\""
      1⤵
        PID:479
      • /bin/bash
        sh -c "sudo /bin/zsh -c \"/Users/run/Bambu_Studio_win-v01.08.04.51.exe\""
        1⤵
          PID:479
        • /usr/libexec/pkreporter
          /usr/libexec/pkreporter
          1⤵
            PID:478
          • /usr/libexec/xpcproxy
            xpcproxy com.apple.loginwindow.LWWeeklyMessageTracer
            1⤵
              PID:480
            • /usr/bin/sudo
              sudo /bin/zsh -c /Users/run/Bambu_Studio_win-v01.08.04.51.exe
              1⤵
                PID:479
                • /bin/zsh
                  /bin/zsh -c /Users/run/Bambu_Studio_win-v01.08.04.51.exe
                  2⤵
                    PID:484
                  • /Users/run/Bambu_Studio_win-v01.08.04.51.exe
                    /Users/run/Bambu_Studio_win-v01.08.04.51.exe
                    2⤵
                      PID:484
                  • /usr/libexec/xpcproxy
                    xpcproxy com.oracle.java.Java-Updater
                    1⤵
                      PID:481
                    • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                      /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                      1⤵
                        PID:480
                      • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                        "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                        1⤵
                          PID:481
                        • /usr/libexec/xpcproxy
                          xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                          1⤵
                            PID:526
                          • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                            /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                            1⤵
                              PID:526

                            Network

                            MITRE ATT&CK Matrix ATT&CK v13

                            Defense Evasion

                            Hide Artifacts

                            1
                            T1564

                            Resource Forking

                            1
                            T1564.009

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads