Play interactive tourEdit tour
Analysis Report Mixed In Key 8.pkg
Overview
General Information
Detection
EvilQuest
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus detection for dropped file
Detected macOS EvilQuest ransomware
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected EvilQuest Ransomware
App bundle contains hidden files/directories
Contains functionality related to in-memory code execution
Contains functionality related to key logging
Contains symbols with suspicious names likely related to privilege escalation
Creates hidden Mach-O files
Deletes many files in the user directory
Denies being traced/debugged (via ptrace PT_DENY_ATTACH)
Executes shell scripts with administrative rights
Executes the "sudo" command used to execute a command as another user
Might steal keychain information which contains credentials
Moves itself during installation or deletes itself after installation
Process executable has a file extension which is uncommon (probably to disguise the executable)
Process path indicates hidden application bundle (probably to disguise it)
Reads local browser cookies
Reads process information of other processes
Writes Mach-O files to untypical directories
Changes permissions of written Mach-O files
Contains symbols with suspicious names likely related to encryption
Contains symbols with suspicious names likely related to networking
Creates 'launchd' managed services aka launch agents with bundle ID names to possibly disguise malicious intentions
Creates application bundles
Creates code signed application bundles
Creates hidden files, links and/or directories
Creates memory-persistent launch services
Creates system-wide 'launchd' managed services aka launch daemons
Creates user-wide 'launchd' managed services aka launch agents
Executes Apple scripts and/or other OSA language scripts with shell command 'osascript'
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "mkdir" command used to create folders
Executes the "security_authtrampoline" command used to authorize execution with root privileges (GUI prompt)
Explicitly loads/starts launch services
HTTP GET or POST without a user agent
Many shell processes execute programs via execve syscall (might be indicative for malicious behavior)
Reads hardware related sysctl values
Reads launchservices plist files
Reads the systems OS release and/or type
Reads the systems hostname
Uses AppleScript framework/components containing Apple Script related functionalities
Uses AppleScript scripting additions containing additional functionalities for Apple Scripts
Uses CFNetwork bundle containing interfaces for network communication (HTTP, sockets, and Bonjour)
Writes 64-bit Mach-O files to disk
Writes RTF files to disk
Writes a file containing only its PID
Classification
Analysis Advice |
---|
Some HTTP requests failed (404). It is likely the sample will exhibit less behavior |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 808 |
Start date: | 07.06.2021 |
Start time: | 19:13:02 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 9m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Mixed In Key 8.pkg |
Cookbook file name: | defaultmacfilecookbook.jbs |
Analysis system description: | Virtual Machine, High Sierra (Office 2016 v16.16, Java 11.0.2+9, Adobe Reader 2019.010.20099) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal100.rans.spyw.expl.evad.macPKG@0/1672@2/0 |
Warnings: | Show All
|
Process Tree |
---|
|
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security |
Dropped Files |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security | ||
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security | ||
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security | ||
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security | ||
JoeSecurity_EvilQuest | Yara detected EvilQuest Ransomware | Joe Security | ||
Click to see the 3 entries |
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Antivirus detection for dropped file | Show sources |
Source: | Avira: | ||
Source: | Avira: |
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: | ||
Source: | Mach-O header: |
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: |
Privilege Escalation: |
---|
Contains symbols with suspicious names likely related to privilege escalation | Show sources |
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: | ||
Source: | Mach-O symbol: |
Executes shell scripts with administrative rights | Show sources |
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: | ||
Source: | Osascript admin shell script: |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Reads from socket in process: | ||
Source: | Reads from socket in process: |
Source: | HTTP traffic detected: |