Resubmissions

23-12-2024 23:57

241223-3zn4ysvrft 4

23-12-2024 18:48

241223-xf7jasxpan 10

Analysis

  • max time kernel
    64s
  • max time network
    28s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241106-en
  • resource tags

    arch:amd64arch:i386image:macos-20241106-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    23-12-2024 23:57

General

  • Target

    2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe

  • Size

    2.2MB

  • MD5

    0d367efb1cf032156babe31da7149e60

  • SHA1

    15132f97054363316ffeccdb509367fa3ac76fed

  • SHA256

    092d5dcc96cac790d95664225e83e9b96a6ecc945ae51aed9518d62baf2337aa

  • SHA512

    0c17335f6b5db12cff8a10abc1658dbc513cba747c3fa547d2b6d7cbdef49ef03c5758dac76d70c425f3c07221fcfbc7d8532044f1e531e1877305777ad1ee61

  • SSDEEP

    49152:QnsEMSPbcBVQej/1INRFSqTdX1HkQo6SAARdhnvn:QfPoBhz1aRFSUDk36SAEdhvn

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe\""
    1⤵
      PID:455
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe\""
      1⤵
        PID:455
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe
        1⤵
          PID:455
          • /bin/zsh
            /bin/zsh -c /Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe
            2⤵
              PID:460
            • /Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe
              /Users/run/2024-12-23_0d367efb1cf032156babe31da7149e60_wannacry.exe
              2⤵
                PID:460
            • /usr/libexec/pkreporter
              /usr/libexec/pkreporter
              1⤵
                PID:444
              • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                1⤵
                  PID:449
                • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  1⤵
                    PID:446
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:442
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:451
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.audio.AudioComponentRegistrar
                        1⤵
                          PID:483
                        • /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar
                          /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon
                          1⤵
                            PID:483
                          • /usr/libexec/xpcproxy
                            xpcproxy com.apple.nsurlstoraged
                            1⤵
                              PID:490
                            • /usr/libexec/nsurlstoraged
                              /usr/libexec/nsurlstoraged --privileged
                              1⤵
                                PID:490

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads