Analysis

  • max time kernel
    1799s
  • max time network
    1786s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    31/08/2024, 16:43

General

  • Target

    $PLUGINSDIR/System.dll

  • Size

    10KB

  • MD5

    56a321bd011112ec5d8a32b2f6fd3231

  • SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

  • SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

  • SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • SSDEEP

    192:uv+cJZE61KRWJQO6tFiUdK7ckK4k7l1XRBm0w+NiHi1GSJ:uf6rtFRduQ1W+fG8

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/\$PLUGINSDIR/System.dll\""
    1⤵
      PID:481
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/\$PLUGINSDIR/System.dll\""
      1⤵
        PID:481
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run//System.dll
        1⤵
          PID:481
          • /bin/zsh
            /bin/zsh -c /Users/run//System.dll
            2⤵
              PID:484
            • /Users/run//System.dll
              /Users/run//System.dll
              2⤵
                PID:484
            • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              1⤵
                PID:468
              • /usr/libexec/pkreporter
                /usr/libexec/pkreporter
                1⤵
                  PID:471
                • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  1⤵
                    PID:474
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:466
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:477
                      • /bin/launchctl
                        /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                        1⤵
                          PID:515
                        • /bin/launchctl
                          /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                          1⤵
                            PID:516
                          • /usr/libexec/xpcproxy
                            xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                            1⤵
                              PID:520
                            • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                              /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                              1⤵
                                PID:520
                              • /usr/libexec/xpcproxy
                                xpcproxy com.apple.spindump
                                1⤵
                                  PID:532
                                • /usr/sbin/spindump
                                  /usr/sbin/spindump
                                  1⤵
                                    PID:532
                                  • /usr/libexec/xpcproxy
                                    xpcproxy com.apple.diagnosticd
                                    1⤵
                                      PID:533
                                    • /usr/libexec/diagnosticd
                                      /usr/libexec/diagnosticd
                                      1⤵
                                        PID:533
                                      • /usr/libexec/xpcproxy
                                        xpcproxy com.apple.newsyslog
                                        1⤵
                                          PID:534
                                        • /usr/sbin/newsyslog
                                          /usr/sbin/newsyslog
                                          1⤵
                                            PID:534

                                          Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads