Analysis

  • max time kernel
    85s
  • max time network
    105s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241106-en
  • resource tags

    arch:amd64arch:i386image:macos-20241106-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    25-11-2024 11:19

General

  • Target

    cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector

  • Size

    120KB

  • MD5

    ce34cf0e6dba7e4e003e20bd076e4f21

  • SHA1

    60df0d3f38d36c83c13ec1d89ec142373a96538e

  • SHA256

    b046837030fe7cf858b856f2ad53c1fd8c5e65b362ffd43954a498434153e989

  • SHA512

    a669c9b5ab788371b35bd08c5a9ea344181fff4aea501d7c248c5668182f579ad523c0035a72a04d8fcbb14b0cdbd0c09e4f85f18fd9e27e36ea783a675d4060

  • SSDEEP

    1536:z5BbaTOV0iKSd2JNGfYWB7P6mzh5CWzpf/cjOVYXzLDSPD0vvpN:z5BbyOV0iKSMNU9CycIYXnD4DmBN

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector\""
    1⤵
      PID:481
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector\""
      1⤵
        PID:481
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector"
        1⤵
          PID:481
          • /bin/zsh
            /bin/zsh -c "/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector"
            2⤵
              PID:482
            • /Users/run/cdautorun/Picasa
              /Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector
              2⤵
                PID:482
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.audio.AudioComponentRegistrar
              1⤵
                PID:483
              • /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar
                /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon
                1⤵
                  PID:483
                • /usr/libexec/xpcproxy
                  xpcproxy com.apple.nsurlstoraged
                  1⤵
                    PID:515
                  • /usr/libexec/nsurlstoraged
                    /usr/libexec/nsurlstoraged --privileged
                    1⤵
                      PID:515

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • /var/db/nsurlstoraged/dafsaData.bin

                      Filesize

                      54KB

                      MD5

                      64f469698e53d0c828b7f90acd306082

                      SHA1

                      bcc041b3849e1b0b4104ffeb46002207eeac54f3

                      SHA256

                      d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd

                      SHA512

                      a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f