Analysis

  • max time kernel
    345s
  • max time network
    1584s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240410-en
  • resource tags

    arch:amd64arch:i386image:macos-20240410-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    10-06-2024 14:28

General

  • Target

    blender-4.1.1-windows-x64.msi

  • Size

    327.3MB

  • MD5

    55bd512f4202de3fc8ff955244c4d989

  • SHA1

    570df513795d8311ca73f4fd0da860766180aaa3

  • SHA256

    d53c619e9af77d0e4f360559a481f70b93e37fb12dafc482deeeb6cbb7aa5ec7

  • SHA512

    6e77b9a168039fa62ca40d464108153d2c49341d879cf68351b3f59dff4146e3308d3936ba369e24701d31a085bc76adf06f5a26e13ed37c58fe05e079fa8564

  • SSDEEP

    6291456:gAczC3CKnLV8quNt/jN7FeBv8ornondKEBndCXkWTAFTZE:gbKnx83NrFw0KO8EqfTA1

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 1 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /usr/libexec/xpcproxy
    xpcproxy com.apple.logkextloadsd
    1⤵
      PID:479
    • /usr/libexec/xpcproxy
      xpcproxy com.apple.var-db-dslocal-backup
      1⤵
        PID:480
      • /usr/bin/xar
        /usr/bin/xar -c -f dslocal-backup.xar dslocal
        1⤵
          PID:480
        • /usr/libexec/xpcproxy
          xpcproxy com.apple.gkreport
          1⤵
            PID:481
          • /usr/libexec/gkreport
            /usr/libexec/gkreport
            1⤵
              PID:481
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.systemstats.daily
              1⤵
                PID:482
              • /usr/libexec/xpcproxy
                xpcproxy com.oracle.java.Java-Updater
                1⤵
                  PID:484
                • /bin/sh
                  sh -c "sudo /bin/zsh -c \"/Users/run/blender-4.1.1-windows-x64.msi\""
                  1⤵
                    PID:485
                  • /bin/bash
                    sh -c "sudo /bin/zsh -c \"/Users/run/blender-4.1.1-windows-x64.msi\""
                    1⤵
                      PID:485
                    • /usr/bin/sudo
                      sudo /bin/zsh -c /Users/run/blender-4.1.1-windows-x64.msi
                      1⤵
                        PID:485
                        • /bin/zsh
                          /bin/zsh -c /Users/run/blender-4.1.1-windows-x64.msi
                          2⤵
                            PID:486
                          • /Users/run/blender-4.1.1-windows-x64.msi
                            /Users/run/blender-4.1.1-windows-x64.msi
                            2⤵
                              PID:486
                          • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                            "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                            1⤵
                              PID:484
                            • /usr/sbin/spctl
                              /usr/sbin/spctl --assess --type execute /Applications/OneDrive.app
                              1⤵
                                PID:525
                              • /bin/launchctl
                                /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                                1⤵
                                  PID:537
                                • /bin/launchctl
                                  /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                                  1⤵
                                    PID:538
                                  • /usr/libexec/xpcproxy
                                    xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                                    1⤵
                                      PID:541
                                    • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                                      /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                                      1⤵
                                        PID:541
                                      • /usr/libexec/xpcproxy
                                        xpcproxy com.apple.spindump
                                        1⤵
                                          PID:543
                                        • /usr/sbin/spindump
                                          /usr/sbin/spindump
                                          1⤵
                                            PID:543
                                          • /usr/libexec/xpcproxy
                                            xpcproxy com.apple.diagnosticd
                                            1⤵
                                              PID:544
                                            • /usr/libexec/diagnosticd
                                              /usr/libexec/diagnosticd
                                              1⤵
                                                PID:544

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • /var/db/loadedkextmt.plist
                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e