Resubmissions
28-07-2024 07:07
240728-hxpmgsthmr 1027-07-2024 18:52
240727-xh78lswhmg 1029-05-2024 01:42
240529-b4pshaeb68 1028-05-2024 03:12
240528-dqg7lsdg65 1028-05-2024 03:08
240528-dnct4sdf86 1028-05-2024 00:39
240528-az15ashb56 1026-05-2024 05:03
240526-fp6vpagf79 326-05-2024 04:32
240526-e585bafg76 1026-05-2024 04:29
240526-e4bgnaeh91 1026-05-2024 04:26
240526-e2y5yaff38 4Analysis
-
max time kernel
96s -
max time network
99s -
platform
macos-10.15_amd64 -
resource
macos-20240410-en -
resource tags
arch:amd64arch:i386image:macos-20240410-enkernel:19b77alocale:en-usos:macos-10.15-amd64system -
submitted
26-05-2024 04:26
Static task
static1
General
-
Target
WannaCry.exe
-
Size
3.4MB
-
MD5
84c82835a5d21bbcf75a61706d8ab549
-
SHA1
5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
-
SHA256
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
-
SHA512
90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB
Malware Config
Signatures
-
JavaScript 1 TTPs 1 IoCs
Adversaries may abuse various implementations of JavaScript for execution.
Processes:
ioc process "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/bin/java" -jar /Users/run/tmp/hello.jar -
Resource Forking 1 TTPs 1 IoCs
Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.
Processes:
ioc process /System/Library/Frameworks/Quartz.framework/Frameworks/QuickLookUI.framework/Resources/QuickLookUIHelper.app/Contents/MacOS/QuickLookUIHelper
Processes
-
/bin/shsh -c "sudo /bin/zsh -c \"/Users/run/WannaCry.exe\""1⤵PID:485
-
/bin/bashsh -c "sudo /bin/zsh -c \"/Users/run/WannaCry.exe\""1⤵PID:485
-
/usr/bin/sudosudo /bin/zsh -c /Users/run/WannaCry.exe1⤵PID:485
-
/bin/zsh/bin/zsh -c /Users/run/WannaCry.exe2⤵PID:486
-
/Users/run/WannaCry.exe/Users/run/WannaCry.exe2⤵PID:486
-
/usr/bin/pluginkit/usr/bin/pluginkit -e ignore -i com.microsoft.OneDrive.FinderSync1⤵PID:489
-
/usr/sbin/spctl/usr/sbin/spctl --assess --type execute /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/T/OneDriveUpdater0BF23177/OneDrive.app1⤵PID:490
-
/usr/libexec/xpcproxyxpcproxy com.apple.quicklook.ui.helper1⤵PID:530
-
/System/Library/Frameworks/Quartz.framework/Frameworks/QuickLookUI.framework/Resources/QuickLookUIHelper.app/Contents/MacOS/QuickLookUIHelper/System/Library/Frameworks/Quartz.framework/Frameworks/QuickLookUI.framework/Resources/QuickLookUIHelper.app/Contents/MacOS/QuickLookUIHelper1⤵PID:530
-
/usr/libexec/xpcproxyxpcproxy com.apple.JarLauncher.21281⤵PID:531
-
/System/Library/CoreServices/Jar Launcher.app/Contents/MacOS/Jar Launcher"/System/Library/CoreServices/Jar Launcher.app/Contents/MacOS/Jar Launcher"1⤵PID:531
-
/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/bin/java"/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/bin/java" -jar /Users/run/tmp/hello.jar2⤵PID:533
-
/usr/libexec/xpcproxyxpcproxy com.apple.metadata.mdwrite1⤵PID:532
-
/usr/libexec/xpcproxyxpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E1⤵PID:537
-
/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService1⤵PID:537