macOS
Analysis Report
exec.2430808
Overview
General Information
Detection
XCSSET
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected XCSSET
Sends data within HTTP X-headers likely leaking sensitive information
Writes compiled Apple script to disk (with potentially malicious intention)
Creates launch services redirecting its stdout/stderr to /dev/null (probably to hide errors)
Searches for processes that are suspiciously named
Written Apple script contain uncommon file extension (probably to disguise the script)
Executes the "csrutil" command used to retrieve or modify the "System Integrity Protection" configuration
Queries the unique Apple serial number of the machine
Sets the property list key LSUIElement for running apps in the background without appearing in the Dock
Writes Mach-O files to untypical directories
Tries to delete plist files with Apple identifiers
Likely kills multiple processes
Copies icons from applications possibly to disguise malicious intentions
Writes Mach-O files to disk with suspicious names (probably to obfuscate its intention)
Likely queries the I/O Kit registry to detect VMs by querying the "IOPlatformExpertDevice" class
Executes the "xxd" command used for reading and creating hexdumps
Yara signature match
Uses AppleScript framework/components containing Apple Script related functionalities
Explicitly unloads, stops, and/or removes launch services
Executes the "mkdir" command used to create folders
Executes the "grep" command used to find patterns in files or piped streams
Executes Apple scripts and/or other OSA language scripts with shell command 'osascript'
Executes the "chmod" command used to modify permissions
Executes the "curl" command used to transfer data via the network (typically using HTTP/S)
Executes the "ping" command used for connectivity testing via ICMP
Uses AppleScript scripting additions containing additional functionalities for Apple Scripts
Reads file resource fork extended attributes
Deletes icon files
Creates code signed application bundles
Mach-O contains sections with high entropy indicating compressed/encrypted content
Changes permissions of written Mach-O files
Executes commands using a shell command-line interpreter
Executes the "defaults" command used to read or modify user specific settings
Executes the "touch" command used to create files or modify time stamps
Executes the "plutil" command used to modify plists
Executes the "ioreg" command used to gather hardware information (I/O kit registry)
Reads the systems hostname
Reads the sysctl safe boot value (probably to check if the system is in safe boot mode)
Executes the "ps" command used to list the status of processes
Writes icon files to disk
Creates memory-persistent launch services
Executes the "sysctl" command used to retrieve or modify kernel settings
Explicitly loads/starts launch services
Queries the macOS product version
Creates launch services that start periodically
Reads hardware related sysctl values
Executes the "codesign" command used to create and manipulate code signatures
Creates user-wide 'launchd' managed services aka launch agents
Creates 'launchd' managed services aka launch agents with bundle ID names to possibly disguise malicious intentions
Creates hidden files, links and/or directories
Executes the "rm" command used to delete files or directories
Many shell processes execute programs via execve syscall (might be indicative for malicious behavior)
Writes FAT Mach-O files to disk
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Joe Sandbox Version: | |
Analysis ID: | 176612 |
Start date and time: | 2022-08-24 11:18:17 +02:00 |
Joe Sandbox Product: | Cloud |
Overall analysis duration: | 0h 5m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | exec.2430808 |
Cookbook file name: | macOS - Monterey - load provided binary as normal user.jbs |
Analysis system description: | Mac Mini, Monterey (Java 1.8.0_341) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.mac2430808@0/32@2/0 |
- Report creation exceeded maximum number of non-whitelisted processes and may have missing process information.
Command: | sudo -u pedro /Users/pedro/Desktop/exec.2430808 |
PID: | 956 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | launched with args v10 notes app: basedir:, autoclean: , domain: target dir is: /Users/pedro/Library/Group Containers/group.com.apple.mail target domain: melindas.ru target plist: /Users/pedro/Library/LaunchAgents/com.apple.spx.plist step 1 step 2 step 3 first launch. processing... cleaning done... created directory structure... compiled app... created scpt... put Xcode icon in place... wrote to LaunchAgents... wrote .plist loaded service... wrote .report wrote .domain done. finished. |
Standard Error: |
- System is mac-monterey
- mono-sgen64 New Fork (PID: 956, Parent: 913)
- sudo New Fork (PID: 957, Parent: 956)
- bash New Fork (PID: 959, Parent: 957)
- bash New Fork (PID: 960, Parent: 959)
- bash New Fork (PID: 961, Parent: 959)
- bash New Fork (PID: 962, Parent: 957)
- bash New Fork (PID: 963, Parent: 962)
- bash New Fork (PID: 964, Parent: 962)
- bash New Fork (PID: 965, Parent: 957)
- bash New Fork (PID: 966, Parent: 965)
- bash New Fork (PID: 967, Parent: 965)
- bash New Fork (PID: 968, Parent: 957)
- bash New Fork (PID: 969, Parent: 968)
- bash New Fork (PID: 970, Parent: 968)
- bash New Fork (PID: 971, Parent: 957)
- bash New Fork (PID: 972, Parent: 971)
- bash New Fork (PID: 973, Parent: 971)
- bash New Fork (PID: 974, Parent: 957)
- bash New Fork (PID: 975, Parent: 974)
- bash New Fork (PID: 976, Parent: 974)
- bash New Fork (PID: 979, Parent: 957)
- bash New Fork (PID: 983, Parent: 957)
- bash New Fork (PID: 984, Parent: 957)
- bash New Fork (PID: 985, Parent: 957)
- bash New Fork (PID: 986, Parent: 957)
- bash New Fork (PID: 987, Parent: 957)
- bash New Fork (PID: 988, Parent: 957)
- bash New Fork (PID: 989, Parent: 957)
- bash New Fork (PID: 990, Parent: 957)
- bash New Fork (PID: 991, Parent: 957)
- bash New Fork (PID: 992, Parent: 957)
- bash New Fork (PID: 993, Parent: 957)
- bash New Fork (PID: 994, Parent: 957)
- bash New Fork (PID: 995, Parent: 957)
- bash New Fork (PID: 996, Parent: 957)
- bash New Fork (PID: 997, Parent: 957)
- bash New Fork (PID: 998, Parent: 957)
- bash New Fork (PID: 999, Parent: 957)
- bash New Fork (PID: 1000, Parent: 957)
- bash New Fork (PID: 1001, Parent: 957)
- codesign New Fork (PID: 1002, Parent: 1001)
- bash New Fork (PID: 1003, Parent: 957)
- bash New Fork (PID: 1004, Parent: 957)
- bash New Fork (PID: 1005, Parent: 957)
- bash New Fork (PID: 1006, Parent: 957)
- bash New Fork (PID: 1007, Parent: 957)
- bash New Fork (PID: 1010, Parent: 957)
- bash New Fork (PID: 1013, Parent: 957)
- bash New Fork (PID: 1014, Parent: 957)
- bash New Fork (PID: 1015, Parent: 957)
- bash New Fork (PID: 1016, Parent: 957)
- bash New Fork (PID: 1017, Parent: 957)
- bash New Fork (PID: 1018, Parent: 957)
- bash New Fork (PID: 1019, Parent: 957)
- bash New Fork (PID: 1024, Parent: 957)
- bash New Fork (PID: 1025, Parent: 957)
- xpcproxy New Fork (PID: 1020, Parent: 1)
- bash New Fork (PID: 1023, Parent: 1020)
- sh New Fork (PID: 1028, Parent: 1023)
- sh New Fork (PID: 1029, Parent: 1028)
- sh New Fork (PID: 1030, Parent: 1028)
- sh New Fork (PID: 1031, Parent: 1028)
- sh New Fork (PID: 1032, Parent: 1028)
- sh New Fork (PID: 1033, Parent: 1028)
- sh New Fork (PID: 1036, Parent: 1028)
- bash New Fork (PID: 1037, Parent: 1036)
- sh New Fork (PID: 1038, Parent: 1037)
- sh New Fork (PID: 1039, Parent: 1037)
- sh New Fork (PID: 1040, Parent: 1037)
- sh New Fork (PID: 1043, Parent: 1037)
- sh New Fork (PID: 1044, Parent: 1037)
- sh New Fork (PID: 1048, Parent: 1037)
- sh New Fork (PID: 1053, Parent: 1037)
- sh New Fork (PID: 1054, Parent: 1037)
- sh New Fork (PID: 1056, Parent: 1037)
- sh New Fork (PID: 1059, Parent: 1037)
- sh New Fork (PID: 1060, Parent: 1037)
- sh New Fork (PID: 1063, Parent: 1037)
- sh New Fork (PID: 1064, Parent: 1037)
- sh New Fork (PID: 1067, Parent: 1037)
- sh New Fork (PID: 1068, Parent: 1037)
- bash New Fork (PID: 1069, Parent: 1068)
- bash New Fork (PID: 1070, Parent: 1068)
- bash New Fork (PID: 1071, Parent: 1068)
- bash New Fork (PID: 1072, Parent: 1068)
- bash New Fork (PID: 1073, Parent: 1068)
- sh New Fork (PID: 1074, Parent: 1037)
- sh New Fork (PID: 1075, Parent: 1037)
- sh New Fork (PID: 1078, Parent: 1037)
- sh New Fork (PID: 1079, Parent: 1037)
- sh New Fork (PID: 1080, Parent: 1037)
- bash New Fork (PID: 1081, Parent: 1080)
- sh New Fork (PID: 1082, Parent: 1037)
- sh New Fork (PID: 1083, Parent: 1037)
- sh New Fork (PID: 1084, Parent: 1037)
- sh New Fork (PID: 1085, Parent: 1037)
- bash New Fork (PID: 1086, Parent: 1085)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
EXT_SUSP_OBFUSC_macOS_RootHelper_Obfuscated | Yara for the public tool \'roothelper\'. Used by XCSSET (https://gist.github.com/NullArray/f39b026b9e0d19f1e17390a244d679ec) | im0prtp3 |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XCSSET | Yara detected XCSSET | Joe Security |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior | ||
Source: | Writes from socket in process: | Jump to behavior |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: |
Source: | Reads from socket in process: | Jump to behavior | ||
Source: | Reads from socket in process: | Jump to behavior | ||
Source: |