Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    13-09-2024 19:12

General

  • Target

    debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118

  • Size

    37KB

  • MD5

    debb03ea54bfe8e6262a1582ebba7420

  • SHA1

    39012aa1786dc154d4a112b253ead9ba743f7faa

  • SHA256

    fda08c9f865ac8cb19152239af67766523e39bc7c707ca61ea554c9674af6eb0

  • SHA512

    c7bfdaec42df736ef1dca12212f8981443d472ff2eda229b8fe71f5279704018eb7f8021a43906b35d4c54846690b81a3cb7f2f4c3616bad4b64139ef334ea27

  • SSDEEP

    768:uymfskL7ksQ+i2evRtFL1wA9y8W+FfjAd40uSRf1yC://W7kqihFD+ofjy40N1

Malware Config

Signatures

  • RC Scripts 1 TTPs

    Adversaries may establish persistence by modifying RC scripts which are executed during a Unix-like systems startup. These files allow system administrators to map and start custom services at startup for different run levels.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118\""
    1⤵
      PID:488
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118\""
      1⤵
        PID:488
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118
        1⤵
          PID:488
          • /bin/zsh
            /bin/zsh -c /Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118
            2⤵
              PID:489
            • /Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118
              /Users/run/debb03ea54bfe8e6262a1582ebba7420_JaffaCakes118
              2⤵
                PID:489
            • /bin/launchctl
              /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
              1⤵
                PID:526
              • /bin/launchctl
                /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                1⤵
                  PID:527
                • /usr/libexec/xpcproxy
                  xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                  1⤵
                    PID:531
                  • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                    /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                    1⤵
                      PID:531

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads