macOS
Analysis Report
CorelDRAW
Overview
General Information
Detection
GIMMICK
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected GIMMICK
Writes Mach-O files to untypical directories
Process deletes its process image on disk
Moves itself during installation or deletes itself after installation
Creates system-wide 'launchd' managed services aka launch daemons based on hidden files
Contains symbols with suspicious names likely related to encryption
Reads the sysctl hardware model value (might be used for detecting VM presence)
Sample is code signed by an ad-hoc signature
Contains symbols with suspicious names likely related to networking
Explicitly unloads, stops, and/or removes launch services
Reads the systems hostname
Creates system-wide 'launchd' managed services aka launch daemons
Executes the "grep" command used to find patterns in files or piped streams
Executes the "ps" command used to list the status of processes
Mach-O sample file contains an ARM64 binary that executes on Apple Silicon
Contains symbols with suspicious names likely related to well-known browsers
Sample is a FAT Mach-O sample containing binaries for multiple architectures
Creates memory-persistent launch services
Explicitly loads/starts launch services
Creates launch services that start periodically
Uses CFNetwork bundle containing interfaces for network communication (HTTP, sockets, and Bonjour)
Changes permissions of written Mach-O files
Executes commands using a shell command-line interpreter
Writes FAT Mach-O files to disk
Classification
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 1797574 |
Start date and time: | 2022-03-28 12:12:09 +02:00 |
Joe Sandbox Product: | Cloud |
Overall analysis duration: | 0h 3m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | CorelDRAW |
Cookbook file name: | defaultmacfilecookbook.jbs |
Analysis system description: | Mac Mini, Big Sur (Office 2019 16.55, Java 1.8.0_311) |
Run name: | Potential for more IOCs and behavior |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal64.troj.evad.mac@0/14@2/0 |
- Excluded IPs from analysis (whitelisted): 172.217.168.74, 172.217.168.67
- Excluded domains from analysis (whitelisted): oauth2.googleapis.com, ocsp.pki.goog
Command: | /Users/drew/Desktop/CorelDRAW |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | /Library/LaunchDaemons/com.CorelDRAW.va.plist: Could not find specified service Unload failed: 113: Could not find specified service |
- System is mac-bigsur
- mono-sgen64 New Fork (PID: 1612, Parent: 1569)
- sh New Fork (PID: 1613, Parent: 1612)
- bash New Fork (PID: 1614, Parent: 1613)
- bash New Fork (PID: 1615, Parent: 1613)
- bash New Fork (PID: 1616, Parent: 1613)
- bash New Fork (PID: 1617, Parent: 1613)
- bash New Fork (PID: 1618, Parent: 1613)
- bash New Fork (PID: 1619, Parent: 1613)
- sh New Fork (PID: 1620, Parent: 1612)
- bash New Fork (PID: 1621, Parent: 1620)
- bash New Fork (PID: 1622, Parent: 1620)
- bash New Fork (PID: 1623, Parent: 1620)
- bash New Fork (PID: 1624, Parent: 1620)
- bash New Fork (PID: 1625, Parent: 1620)
- bash New Fork (PID: 1626, Parent: 1620)
- sh New Fork (PID: 1627, Parent: 1612)
- sh New Fork (PID: 1628, Parent: 1612)
- sh New Fork (PID: 1629, Parent: 1612)
- xpcproxy New Fork (PID: 1630, Parent: 1)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GIMMICK | Yara detected GIMMICK | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GIMMICK | Yara detected GIMMICK | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GIMMICK | Yara detected GIMMICK | Joe Security | ||
JoeSecurity_GIMMICK | Yara detected GIMMICK | Joe Security | ||
JoeSecurity_GIMMICK | Yara detected GIMMICK | Joe Security |
Click to jump to signature section
Show All Signature Results
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | Classification label: |
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: |
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: |
Persistence and Installation Behavior |
---|
Source: | FAT Mach-O written to unusual path: | Jump to dropped file |
Source: | Process image deleted: | Jump to behavior |
Source: | Code Signing Info: |
Source: | Launch agent/daemon unloaded: | Jump to behavior |
Source: | Grep executable: | Jump to behavior | ||
Source: | Grep executable: | Jump to behavior | ||
Source: | Grep executable: | Jump to behavior | ||
Source: | Grep executable: | Jump to behavior | ||
Source: | Grep executable: | Jump to behavior | ||
Source: | Grep executable: | Jump to behavior |
Source: | Ps executable: | Jump to behavior | ||
Source: | Ps executable: | Jump to behavior |
Source: | Mach-O header: |
Source: | File header: |
Source: | Launch agent/daemon loaded: | Jump to behavior |
Source: | Launch agent/daemon created with StartInterval and/or StartCalendarInterval, file moved: | Jump to behavior |
Source: | CFNetwork info plist opened: | Jump to behavior | ||
Source: | CFNetwork info plist opened: | Jump to behavior |
Source: | Permissions modified for written FAT Mach-O /private/var/root/Library/Preferences/CorelDRAW/CorelDRAW: | Jump to dropped file |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | File written: | Jump to dropped file |
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: |
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: |
Source: | Awk executable: | Jump to behavior | ||
Source: | Awk executable: | Jump to behavior |
Source: | XML plist file created: | Jump to dropped file |
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: |
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: |
Source: | Random device file read: | Jump to behavior |
Source: | Stderr: /Library/LaunchDaemons/com.CorelDRAW.va.plist: Could not find specified serviceUnload failed: 113: Could not find specified service: |
Source: | CodeSign Info: |
Boot Survival |
---|
Source: | Launch daemon created from hidden file: | Jump to behavior |
Source: | Launch daemon created File moved: | Jump to behavior |
Source: | Launch agent/daemon created with KeepAlive and/or RunAtLoad, file moved: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File deleted: | Jump to behavior |
Source: | Sysctl read request: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior |
Source: | System or server version plist file read: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Command and Scripting Interpreter | 1 LC_LOAD_DYLIB Addition | 1 LC_LOAD_DYLIB Addition | 1 Masquerading | 1 GUI Input Capture | 11 Security Software Discovery | Remote Services | 1 GUI Input Capture | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 1 Scripting | 3 Launch Agent | 3 Launch Agent | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | 1 Launchctl | 14 Launch Daemon | 14 Launch Daemon | 1 Scripting | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | 1 Plist Modification | 1 Plist Modification | 1 Hidden Files and Directories | NTDS | 1 System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 11 Invalid Code Signature | LSA Secrets | 21 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 11 Code Signing | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 2 File Deletion | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.