Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    69s
  • max time network
    240s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241101-en
  • resource tags

    arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    06/12/2024, 12:23

General

  • Target

    hypohydrochloria.app

  • Size

    487KB

  • MD5

    271b95b44bbafaf5d68ae0d972e1163a

  • SHA1

    6816bd06b9b638de8e6517dfe7647ce409f2f4c8

  • SHA256

    60412767f4eaea33f06a6a02f3b0975015e75f251ba6cbeee96ac712d0b23f9b

  • SHA512

    cb7a65001cc0dbb63cddcd89166b575bd2612f75100ca47ff8a8162825a5c91a5c2b60b83447f33a7aad1c0f1a7eee4c5f340e5d66141ee59309b59ca461d992

  • SSDEEP

    1536:vGAVO3tWkduBR8240f+rzESOotNlufM+A/:nYQSA6AMIk+A/

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"open /Users/run/hypohydrochloria.app\""
    1⤵
      PID:458
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"open /Users/run/hypohydrochloria.app\""
      1⤵
        PID:458
      • /usr/bin/sudo
        sudo /bin/zsh -c "open /Users/run/hypohydrochloria.app"
        1⤵
          PID:458
          • /bin/zsh
            /bin/zsh -c "open /Users/run/hypohydrochloria.app"
            2⤵
              PID:460
            • /usr/bin/open
              open /Users/run/hypohydrochloria.app
              2⤵
                PID:460
            • /usr/libexec/pkreporter
              /usr/libexec/pkreporter
              1⤵
                PID:447
              • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                1⤵
                  PID:444
                • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                  "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                  1⤵
                    PID:452
                  • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                    /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                    1⤵
                      PID:450
                    • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                      "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                      1⤵
                        PID:442
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.nsurlstoraged
                        1⤵
                          PID:491
                        • /usr/libexec/nsurlstoraged
                          /usr/libexec/nsurlstoraged --privileged
                          1⤵
                            PID:491

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • /var/db/nsurlstoraged/dafsaData.bin

                            Filesize

                            54KB

                            MD5

                            64f469698e53d0c828b7f90acd306082

                            SHA1

                            bcc041b3849e1b0b4104ffeb46002207eeac54f3

                            SHA256

                            d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd

                            SHA512

                            a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f