Overview
overview
7Static
static
1superpriva...ak.zip
windows7-x64
1superpriva...ak.zip
windows10-2004-x64
1Payload/Ma...2x.png
windows7-x64
3Payload/Ma...2x.png
windows10-2004-x64
3Payload/Ma...ad.png
windows7-x64
3Payload/Ma...ad.png
windows10-2004-x64
3Payload/Ma...ts.car
windows7-x64
3Payload/Ma...ts.car
windows10-2004-x64
3Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma...ht.otf
windows7-x64
4Payload/Ma...ht.otf
windows10-2004-x64
7Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma...ic.otf
windows7-x64
4Payload/Ma...ic.otf
windows10-2004-x64
7Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Mabz.app/Mabz
macos-10.15-amd64
1Payload/Ma...bz.bak
macos-10.15-amd64
1Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Ma...a.json
windows7-x64
3Payload/Ma...a.json
windows10-2004-x64
3Payload/Ma...kgInfo
windows7-x64
1Payload/Ma...kgInfo
windows10-2004-x64
1Payload/Ma.../CAREx
macos-10.15-amd64
1Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Ma...es.xml
windows7-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
superprivatedontleak.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
superprivatedontleak.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Payload/Mabz.app/AppIcon76x76@2x~ipad.png
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Payload/Mabz.app/AppIcon76x76@2x~ipad.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Payload/Mabz.app/Assets.car
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Payload/Mabz.app/Assets.car
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Payload/Mabz.app/CashMarket-BoldRounded.otf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Payload/Mabz.app/CashMarket-BoldRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Payload/Mabz.app/CashMarket-Light.otf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Payload/Mabz.app/CashMarket-Light.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Payload/Mabz.app/CashMarket-MediumRounded.otf
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Payload/Mabz.app/CashMarket-MediumRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Payload/Mabz.app/CashMarket-RegularItalic.otf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Payload/Mabz.app/CashMarket-RegularItalic.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Payload/Mabz.app/CashMarket-RegularRounded.otf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Payload/Mabz.app/CashMarket-RegularRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Payload/Mabz.app/Info.plist
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Payload/Mabz.app/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Payload/Mabz.app/Mabz
Resource
macos-20240711.1-en
Behavioral task
behavioral22
Sample
Payload/Mabz.app/Mabz.bak
Resource
macos-20240711.1-en
Behavioral task
behavioral23
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/Info.plist
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/PhoneNumberMetadata.json
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/PhoneNumberMetadata.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Payload/Mabz.app/PkgInfo
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Payload/Mabz.app/PkgInfo
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/CAREx
Resource
macos-20240711.1-en
Behavioral task
behavioral30
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/Info.plist
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/_CodeSignature/CodeResources.xml
Resource
win7-20240708-en
General
-
Target
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/Info.plist
-
Size
702B
-
MD5
f4f10c2f85b6cd580c91fc1542e058a0
-
SHA1
a62004a0e0cd12a50d9ad4879bc920cc8b819f3a
-
SHA256
45df6d34e4df0d58e47007cdb0b5ae2f9b98d9d017331e071b230de437a0c716
-
SHA512
91c46d56905e0515f577f8a1754218c0b98a80a9270a5faaa2dfc14bc4374119510ce808c320f1d8d5def6aaa7170289af20bdd24f0aa468f6b74ff0e2bb3360
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 AcroRd32.exe 2896 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2244 1964 cmd.exe 31 PID 1964 wrote to memory of 2244 1964 cmd.exe 31 PID 1964 wrote to memory of 2244 1964 cmd.exe 31 PID 2244 wrote to memory of 2896 2244 rundll32.exe 32 PID 2244 wrote to memory of 2896 2244 rundll32.exe 32 PID 2244 wrote to memory of 2896 2244 rundll32.exe 32 PID 2244 wrote to memory of 2896 2244 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PhoneNumberKit_PhoneNumberKit.bundle\Info.plist1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PhoneNumberKit_PhoneNumberKit.bundle\Info.plist2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PhoneNumberKit_PhoneNumberKit.bundle\Info.plist"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5622c13b7a1d13ad5a0cc565a22da5fef
SHA1e8af9a94727348f13b1abb482262a66a91ce50b3
SHA2560e734e53af9aef5dee6f96a62211be35cdb7fcea4e8c6a4c3962fd3088baab8f
SHA512160fd38ab019a1e841ff0edd7636691c7e5979184a7e8a143446474985aac1cdc7fd3154323ac986187f4847c124403b557d0f9a2c76fc74622210d116518a06