Analysis

  • max time kernel
    368s
  • max time network
    1573s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    01-11-2024 17:14

General

  • Target

    1718798423855[9].jpg

  • Size

    25KB

  • MD5

    df70d089b1d3d89884feba69fc73e2b1

  • SHA1

    7ee266425c34e80521a211de5cc312f18ec52808

  • SHA256

    29db30c2d2ab614e6a0ac18af787094d5ccfdd1e8f403a64e5ae5fa47afcbec6

  • SHA512

    c7c3841740be99310f2a9ff5d86b66715fc564a2976a8322cede8f2c5a85509140424d235c87df5a08a48c5a23c92bbac9f07eda6117b8a7e18ef01f2c7e42d0

  • SSDEEP

    48:UQPl486MjnNsvIYWiR5QkyTJbZPHXZ9u6gbVwyKzJgWjn/lAel9wvmqkLPXjn+na:R6MT0D5MdtbZPAVwzVwmjXj++aUyC72u

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/1718798423855[9].jpg\""
    1⤵
      PID:485
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/1718798423855[9].jpg\""
      1⤵
        PID:485
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/1718798423855[9].jpg"
        1⤵
          PID:485
          • /bin/zsh
            /bin/zsh -c "/Users/run/1718798423855[9].jpg"
            2⤵
              PID:487
          • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
            "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
            1⤵
              PID:471
            • /usr/libexec/pkreporter
              /usr/libexec/pkreporter
              1⤵
                PID:473
              • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                1⤵
                  PID:474
                • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  1⤵
                    PID:472
                  • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                    "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                    1⤵
                      PID:475
                    • /usr/libexec/xpcproxy
                      xpcproxy com.apple.audio.AudioComponentRegistrar
                      1⤵
                        PID:513
                      • /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar
                        /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon
                        1⤵
                          PID:513
                        • /usr/libexec/xpcproxy
                          xpcproxy com.apple.newsyslog
                          1⤵
                            PID:535
                          • /usr/sbin/newsyslog
                            /usr/sbin/newsyslog
                            1⤵
                              PID:535
                            • /usr/libexec/xpcproxy
                              xpcproxy com.apple.spindump
                              1⤵
                                PID:537
                              • /usr/sbin/spindump
                                /usr/sbin/spindump
                                1⤵
                                  PID:537
                                • /usr/libexec/xpcproxy
                                  xpcproxy com.apple.diagnosticd
                                  1⤵
                                    PID:538
                                  • /usr/libexec/diagnosticd
                                    /usr/libexec/diagnosticd
                                    1⤵
                                      PID:538

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads