Analysis

  • max time kernel
    96s
  • max time network
    151s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    27-08-2024 06:53

General

  • Target

    2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe

  • Size

    346KB

  • MD5

    845b588300cd78b624a7b3e7989e1c20

  • SHA1

    73151376f518192a94816fe129415154cd19a49c

  • SHA256

    f7d9e3c371dead65a74e4b19b1f12bb19203b83c6d093bc6311a83587c18f050

  • SHA512

    16d2d448fcdd72f0cddcc19f2ae01979372347f8b45f33fcc77f337f98252b72ac040e83442e67674f7a8095dbd372e95b572a32007fb1b216896c8138418b75

  • SSDEEP

    6144:5SeOQdaZNxtk8cqhSxvHY9DSeOQdaZNxtk8cqhSxvHY9U:5LOQdaDxq8cqavHYtLOQdaDxq8cqavHJ

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe\""
    1⤵
      PID:481
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe\""
      1⤵
        PID:481
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe
        1⤵
          PID:481
          • /bin/zsh
            /bin/zsh -c /Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe
            2⤵
              PID:484
            • /Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe
              /Users/run/2024-08-27_845b588300cd78b624a7b3e7989e1c20_adload_evilquest_rekoobe
              2⤵
                PID:484
            • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              1⤵
                PID:469
              • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                1⤵
                  PID:467
                • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  1⤵
                    PID:476
                  • /usr/libexec/pkreporter
                    /usr/libexec/pkreporter
                    1⤵
                      PID:472
                    • /bin/sh
                      sh -c "sysctl -n hw.ncpu"
                      1⤵
                        PID:485
                      • /bin/bash
                        sh -c "sysctl -n hw.ncpu"
                        1⤵
                          PID:485
                        • /usr/sbin/sysctl
                          sysctl -n hw.ncpu
                          1⤵
                            PID:485
                          • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                            "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                            1⤵
                              PID:477
                            • /bin/launchctl
                              /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                              1⤵
                                PID:517
                              • /bin/launchctl
                                /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                                1⤵
                                  PID:518
                                • /usr/libexec/xpcproxy
                                  xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                                  1⤵
                                    PID:523
                                  • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                                    /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                                    1⤵
                                      PID:523

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads