Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    140s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241106-en
  • resource tags

    arch:amd64arch:i386image:macos-20241106-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    07/03/2025, 07:52

General

  • Target

    2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe

  • Size

    168KB

  • MD5

    3ac3c9f69482ebb4eedf28758b545464

  • SHA1

    35e9daccf74e3901f8e6270f9ee2a51b7ec8ff49

  • SHA256

    0524d0c8a1d0b264d6055aad559652e87b03c47f3fa18f92ae076669a10edb56

  • SHA512

    3e23e3eab67490e73fe73b89c9e72ca4e05112d40111837da4e63951d0ba3fbb059261bd66044e185fe096891f31d8ce895c46259c90f76f63ed66d49bb2bfe2

  • SSDEEP

    3072:cx6SZwEgOQtbap1jZNFnYo6w68cqhS2iJvHLzxq9v0:5SeOQdaZNxtk8cqhSxvHY9

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe\""
    1⤵
      PID:455
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe\""
      1⤵
        PID:455
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe
        1⤵
          PID:455
          • /bin/zsh
            /bin/zsh -c /Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe
            2⤵
              PID:457
            • /Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe
              /Users/run/2025-03-07_3ac3c9f69482ebb4eedf28758b545464_adload_evilquest_rekoobe
              2⤵
                PID:457
            • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              1⤵
                PID:446
              • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                1⤵
                  PID:451
                • /usr/libexec/pkreporter
                  /usr/libexec/pkreporter
                  1⤵
                    PID:449
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:444
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:452
                      • /bin/sh
                        sh -c "sysctl -n hw.ncpu"
                        1⤵
                          PID:458
                        • /bin/bash
                          sh -c "sysctl -n hw.ncpu"
                          1⤵
                            PID:458
                          • /usr/sbin/sysctl
                            sysctl -n hw.ncpu
                            1⤵
                              PID:458
                            • /usr/libexec/xpcproxy
                              xpcproxy com.apple.nsurlstoraged
                              1⤵
                                PID:490
                              • /usr/libexec/nsurlstoraged
                                /usr/libexec/nsurlstoraged --privileged
                                1⤵
                                  PID:490

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • /var/db/nsurlstoraged/dafsaData.bin

                                  Filesize

                                  54KB

                                  MD5

                                  64f469698e53d0c828b7f90acd306082

                                  SHA1

                                  bcc041b3849e1b0b4104ffeb46002207eeac54f3

                                  SHA256

                                  d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd

                                  SHA512

                                  a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f