Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
11/04/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
ed6d6788440704952d19b2bbbcc280c8_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ed6d6788440704952d19b2bbbcc280c8_JaffaCakes118.apk
Resource
android-x64-20240221-en
General
-
Target
ed6d6788440704952d19b2bbbcc280c8_JaffaCakes118.apk
-
Size
726KB
-
MD5
ed6d6788440704952d19b2bbbcc280c8
-
SHA1
5a04f3564b99c3f2a4cae4540f5b64fc0371cd28
-
SHA256
cc314c4f4acf97313871a514e2520cfdd14629049d8ec38440c1109da9d5ed0c
-
SHA512
a34529f3d893bf2916509829d514b7a4c76ac7e08380a3670f9eed8593f3cc30cae9f10f9ae96862aab761f91edb76ce4cb22194000da303eebcdb7826272ad7
-
SSDEEP
12288:AoHlEEAqlsMji8AWk8vN0SQ6vDdYU3w3Zy80cSIrRJqljGzBmuUaLsVIs:xZZrjLa8vNEYeZyqS8UgmNaLDs
Malware Config
Signatures
-
pid Process 4177 com.app.open -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.app.open -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.app.open -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5d0e86385400a9f03c6e670ad49b175fb
SHA1ff3f0d52281406d7ba75ede71be1c1e99be0536f
SHA2569391c96b42639e751cbd87539f9ba773ca3fc8c0603201099820e7897a5b3d6c
SHA51207508fea5c764ea759cdb32d01e8e9c4e08ab5c9f55198b356d2c719e966a885e1278e4f500061a842ae839562aec7babbb6f80cb328812404816c0048eb99a7
-
Filesize
512B
MD5027fab38207ff04e45bf9a2371e09250
SHA15184a407cc72a4cbcc990748e7ea249e0a82d2d8
SHA25657d0dae58dcf7a8d215f4593baff34aa42b5c56762ed3be3a8bb38e4a3bb7b89
SHA5128e99c8a3293dce5cb0a38fb3cb42ea67e53e5a5d8c2725e995f3ab5375c0dfd8fd78f1539f1f3075aea2952a2e2997edd8fc1d253f2a44a092ba52fc3fa20061
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5109d108cdd7e9f478509fb6a7e25b752
SHA172b6f4bc3af23b461b3f66ff3c9c395ca09b5ca6
SHA256cc823e7ac060c4669c7cceb8d0473bf191ec99dadb0a4071e9f6b84213de9697
SHA5123065e2b9a20fa405f09104c4e84c2292dd83b0d6b9288b7845d465411ef45416d59133b1af2e5e3ad9022b95a7bd577e12f9b0129dd9aad56a527c7b54640fb6