Resubmissions

01-07-2024 06:56

240701-hqmvbaydpf 8

01-07-2024 06:56

240701-hqcz4sydpa 8

01-07-2024 05:41

240701-gdhjdsxeqe 8

Analysis

  • max time kernel
    10s
  • max time network
    11s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240611-en
  • resource tags

    arch:amd64arch:i386image:macos-20240611-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    01-07-2024 06:56

General

  • Target

    https://event.on24.com/wcc/r/4630791/3D160EFAABD722C5B75196811AB483CB?mode=login&[email protected]

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 1 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Applications/Google\\ Chrome.app/Contents/MacOS/Google\\ Chrome --simulate-outdated-no-au='Tue, 31 Dec 2099' --new-window https://event.on24.com/wcc/r/4630791/3D160EFAABD722C5B75196811AB483CB?mode=login&[email protected]\""
    1⤵
      PID:558
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Applications/Google\\ Chrome.app/Contents/MacOS/Google\\ Chrome --simulate-outdated-no-au='Tue, 31 Dec 2099' --new-window https://event.on24.com/wcc/r/4630791/3D160EFAABD722C5B75196811AB483CB?mode=login&[email protected]\""
      1⤵
        PID:558
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Applications/Google\\ Chrome.app/Contents/MacOS/Google\\ Chrome --simulate-outdated-no-au='Tue, 31 Dec 2099' --new-window https://event.on24.com/wcc/r/4630791/3D160EFAABD722C5B75196811AB483CB?mode=login&[email protected]"
        1⤵
          PID:558
          • /bin/zsh
            /bin/zsh -c "/Applications/Google\\ Chrome.app/Contents/MacOS/Google\\ Chrome --simulate-outdated-no-au='Tue, 31 Dec 2099' --new-window https://event.on24.com/wcc/r/4630791/3D160EFAABD722C5B75196811AB483CB?mode=login&[email protected]"
            2⤵
              PID:559
          • /usr/libexec/xpcproxy
            xpcproxy com.apple.sysmond
            1⤵
              PID:565
            • /usr/libexec/sysmond
              /usr/libexec/sysmond
              1⤵
                PID:565
              • /usr/libexec/xpcproxy
                xpcproxy com.apple.security.cloudkeychainproxy3
                1⤵
                  PID:586
                • /System/Library/Frameworks/Security.framework/Versions/A/Resources/CloudKeychainProxy.bundle/Contents/MacOS/CloudKeychainProxy
                  /System/Library/Frameworks/Security.framework/Versions/A/Resources/CloudKeychainProxy.bundle/Contents/MacOS/CloudKeychainProxy
                  1⤵
                    PID:586
                  • /usr/bin/pluginkit
                    /usr/bin/pluginkit -e ignore -i com.microsoft.OneDrive.FinderSync
                    1⤵
                      PID:588
                    • /usr/sbin/spctl
                      /usr/sbin/spctl --assess --type execute /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/T/OneDriveUpdater66017B75/OneDrive.app
                      1⤵
                        PID:589

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Defense Evasion

                      Hide Artifacts

                      1
                      T1564

                      Resource Forking

                      1
                      T1564.009

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads