Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
05/04/2024, 03:44
Static task
static1
General
-
Target
c9e3d24ea3e423242ef381087f881fce_JaffaCakes118.apk
-
Size
1.7MB
-
MD5
c9e3d24ea3e423242ef381087f881fce
-
SHA1
b4e586b90e5a469a4a6570462c3bebb154c813cd
-
SHA256
f0db50b396bcdf71b48a19656fa4d9fb4a6bf8b920a667dde5d971c2f3309f50
-
SHA512
93bf68ddbfd4e0bacc65f96b14084a82931dbc5e6aee31f3aa91423bf18356d62210bb18a28a292e674a35babe0fd80e36c68211938e39350b53f960d27a905d
-
SSDEEP
49152:7/jRITrLgJnJn5u4nYR+7z1hFrGHQoDqg2fRJTre7SGM:7rRIPLwnZUUYR+LFy9uR+SV
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.b2087394001.brc -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.b2087394001.brc -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.b2087394001.brc -
Queries information about running processes on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.b2087394001.brc -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.b2087394001.brc
Processes
-
com.b2087394001.brc1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4237
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55cc22f73929cd8c79196e28f66fe9644
SHA11d78cee4a6f8a2a108f77517886b70d4a6f5312c
SHA2562eb18f6e8b71cf2195017825de93326f10d4bcbed1428a5d83a8ef86a81d3c7d
SHA512c59f55e95ef448ce98f6a67f83376b7c14cf169f62f546221212aee2c53294e09ffbafb18ea511a0fdba2abbb9a91b2afd731f012435d4a06e08a52db8d31f56