Analysis

  • max time kernel
    266s
  • max time network
    305s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    15-07-2024 10:51

General

  • Target

    iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js

  • Size

    1KB

  • MD5

    78b3c092345caf5a454e455e0d621fc0

  • SHA1

    6b33619aac78d68e8a8b60e8b3155210727d0868

  • SHA256

    42e3111cef0322e68c6da4cb118e528fa5b1d3020490017c917db3c056af68e1

  • SHA512

    477a40d4dda20ef87fedd0bfa772c5a01de3acb8a75c196c9c0efbb504e79db9f5ec316c92c9f724090d720b514ac1ff10b19237809dc6865861d4d5ab3999bb

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js\""
    1⤵
      PID:484
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js\""
      1⤵
        PID:484
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js"
        1⤵
          PID:484
          • /bin/zsh
            /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js"
            2⤵
              PID:485
            • /Users/run/iconik
              /Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/native_modules/worker.js
              2⤵
                PID:485
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
              1⤵
                PID:519
              • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                1⤵
                  PID:519
                • /bin/launchctl
                  /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                  1⤵
                    PID:526
                  • /bin/launchctl
                    /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                    1⤵
                      PID:527
                    • /usr/libexec/xpcproxy
                      xpcproxy com.apple.DiagnosticReportCleanup.plist
                      1⤵
                        PID:528

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads