Overview
overview
7Static
static
1superpriva...ak.zip
windows7-x64
1superpriva...ak.zip
windows10-2004-x64
1Payload/Ma...2x.png
windows7-x64
3Payload/Ma...2x.png
windows10-2004-x64
3Payload/Ma...ad.png
windows7-x64
3Payload/Ma...ad.png
windows10-2004-x64
3Payload/Ma...ts.car
windows7-x64
3Payload/Ma...ts.car
windows10-2004-x64
3Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma...ht.otf
windows7-x64
4Payload/Ma...ht.otf
windows10-2004-x64
7Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma...ic.otf
windows7-x64
4Payload/Ma...ic.otf
windows10-2004-x64
7Payload/Ma...ed.otf
windows7-x64
4Payload/Ma...ed.otf
windows10-2004-x64
7Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Mabz.app/Mabz
macos-10.15-amd64
1Payload/Ma...bz.bak
macos-10.15-amd64
1Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Ma...a.json
windows7-x64
3Payload/Ma...a.json
windows10-2004-x64
3Payload/Ma...kgInfo
windows7-x64
1Payload/Ma...kgInfo
windows10-2004-x64
1Payload/Ma.../CAREx
macos-10.15-amd64
1Payload/Ma....plist
windows7-x64
3Payload/Ma....plist
windows10-2004-x64
3Payload/Ma...es.xml
windows7-x64
3Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
superprivatedontleak.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
superprivatedontleak.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Payload/Mabz.app/AppIcon76x76@2x~ipad.png
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Payload/Mabz.app/AppIcon76x76@2x~ipad.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Payload/Mabz.app/Assets.car
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Payload/Mabz.app/Assets.car
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Payload/Mabz.app/CashMarket-BoldRounded.otf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Payload/Mabz.app/CashMarket-BoldRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Payload/Mabz.app/CashMarket-Light.otf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Payload/Mabz.app/CashMarket-Light.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Payload/Mabz.app/CashMarket-MediumRounded.otf
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Payload/Mabz.app/CashMarket-MediumRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Payload/Mabz.app/CashMarket-RegularItalic.otf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Payload/Mabz.app/CashMarket-RegularItalic.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Payload/Mabz.app/CashMarket-RegularRounded.otf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Payload/Mabz.app/CashMarket-RegularRounded.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Payload/Mabz.app/Info.plist
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Payload/Mabz.app/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Payload/Mabz.app/Mabz
Resource
macos-20240711.1-en
Behavioral task
behavioral22
Sample
Payload/Mabz.app/Mabz.bak
Resource
macos-20240711.1-en
Behavioral task
behavioral23
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/Info.plist
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/PhoneNumberMetadata.json
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Payload/Mabz.app/PhoneNumberKit_PhoneNumberKit.bundle/PhoneNumberMetadata.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Payload/Mabz.app/PkgInfo
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Payload/Mabz.app/PkgInfo
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/CAREx
Resource
macos-20240711.1-en
Behavioral task
behavioral30
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/Info.plist
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/Info.plist
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
Payload/Mabz.app/PlugIns/CAREx.appex/_CodeSignature/CodeResources.xml
Resource
win7-20240708-en
General
-
Target
Payload/Mabz.app/PlugIns/CAREx.appex/Info.plist
-
Size
962B
-
MD5
aff00cc21a529f1a2dcc53dded6ac4aa
-
SHA1
7d3c2fd4e42d79d2e8030044dad96ccfc83d9c71
-
SHA256
1a47efa41f61bf1061bc84523a1f169de320cb8490a52a7eacf5389e26fbf043
-
SHA512
cba35f14b31c3caca1974914ad8432a5df71b3c99d143e664089825b4e7d001c132c1804a56d3260beeed5bc536fdcbeaee68e9a67101c67f9a1cf484bfcb4c7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2240 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 AcroRd32.exe 2240 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2176 1988 cmd.exe 29 PID 1988 wrote to memory of 2176 1988 cmd.exe 29 PID 1988 wrote to memory of 2176 1988 cmd.exe 29 PID 2176 wrote to memory of 2240 2176 rundll32.exe 30 PID 2176 wrote to memory of 2240 2176 rundll32.exe 30 PID 2176 wrote to memory of 2240 2176 rundll32.exe 30 PID 2176 wrote to memory of 2240 2176 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PlugIns\CAREx.appex\Info.plist1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PlugIns\CAREx.appex\Info.plist2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\PlugIns\CAREx.appex\Info.plist"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f63010c2f0276385202a1416c65868e0
SHA1125df4a239e51c43a6759ab2156c6fa4c458c4d8
SHA2563962a7f962ce8c3312a8d306f8af9c7abc169c0bf618932a96399af89c7e4c8d
SHA512791b1083a7a2833405f34cbf5a1b8bbc2202919b938af78c38514bf6dd6386e4cbcbd7d0755c2ce0b26865e0897fc42bbdfeb7102f4e52e096564190e24a644a