Analysis
-
max time kernel
345s -
max time network
1584s -
platform
macos-10.15_amd64 -
resource
macos-20240410-en -
resource tags
arch:amd64arch:i386image:macos-20240410-enkernel:19b77alocale:en-usos:macos-10.15-amd64system -
submitted
10-06-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
blender-4.1.1-windows-x64.msi
Resource
macos-20240410-en
General
-
Target
blender-4.1.1-windows-x64.msi
-
Size
327.3MB
-
MD5
55bd512f4202de3fc8ff955244c4d989
-
SHA1
570df513795d8311ca73f4fd0da860766180aaa3
-
SHA256
d53c619e9af77d0e4f360559a481f70b93e37fb12dafc482deeeb6cbb7aa5ec7
-
SHA512
6e77b9a168039fa62ca40d464108153d2c49341d879cf68351b3f59dff4146e3308d3936ba369e24701d31a085bc76adf06f5a26e13ed37c58fe05e079fa8564
-
SSDEEP
6291456:gAczC3CKnLV8quNt/jN7FeBv8ornondKEBndCXkWTAFTZE:gbKnx83NrFw0KO8EqfTA1
Malware Config
Signatures
-
Resource Forking 1 TTPs 1 IoCs
Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.
Processes:
ioc process "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
Processes
-
/usr/libexec/xpcproxyxpcproxy com.apple.logkextloadsd1⤵PID:479
-
/usr/libexec/xpcproxyxpcproxy com.apple.var-db-dslocal-backup1⤵PID:480
-
/usr/bin/xar/usr/bin/xar -c -f dslocal-backup.xar dslocal1⤵PID:480
-
/usr/libexec/xpcproxyxpcproxy com.apple.gkreport1⤵PID:481
-
/usr/libexec/gkreport/usr/libexec/gkreport1⤵PID:481
-
/usr/libexec/xpcproxyxpcproxy com.apple.systemstats.daily1⤵PID:482
-
/usr/libexec/xpcproxyxpcproxy com.oracle.java.Java-Updater1⤵PID:484
-
/bin/shsh -c "sudo /bin/zsh -c \"/Users/run/blender-4.1.1-windows-x64.msi\""1⤵PID:485
-
/bin/bashsh -c "sudo /bin/zsh -c \"/Users/run/blender-4.1.1-windows-x64.msi\""1⤵PID:485
-
/usr/bin/sudosudo /bin/zsh -c /Users/run/blender-4.1.1-windows-x64.msi1⤵PID:485
-
/bin/zsh/bin/zsh -c /Users/run/blender-4.1.1-windows-x64.msi2⤵PID:486
-
/Users/run/blender-4.1.1-windows-x64.msi/Users/run/blender-4.1.1-windows-x64.msi2⤵PID:486
-
/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater"/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck1⤵PID:484
-
/usr/sbin/spctl/usr/sbin/spctl --assess --type execute /Applications/OneDrive.app1⤵PID:525
-
/bin/launchctl/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon1⤵PID:537
-
/bin/launchctl/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon1⤵PID:538
-
/usr/libexec/xpcproxyxpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E1⤵PID:541
-
/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService1⤵PID:541
-
/usr/libexec/xpcproxyxpcproxy com.apple.spindump1⤵PID:543
-
/usr/sbin/spindump/usr/sbin/spindump1⤵PID:543
-
/usr/libexec/xpcproxyxpcproxy com.apple.diagnosticd1⤵PID:544
-
/usr/libexec/diagnosticd/usr/libexec/diagnosticd1⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/var/db/loadedkextmt.plistMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e