Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
28/04/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
064dc86c7d7b2d43316c258385d93923_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
064dc86c7d7b2d43316c258385d93923_JaffaCakes118.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
064dc86c7d7b2d43316c258385d93923_JaffaCakes118.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
064dc86c7d7b2d43316c258385d93923_JaffaCakes118.apk
-
Size
2.1MB
-
MD5
064dc86c7d7b2d43316c258385d93923
-
SHA1
ea7e4304ed518954f51502f4d084ac5e61e11097
-
SHA256
6b4e409b678d2fe6812bbb658d98da9f6a02c9d2c2f2dacd3c0593ced7df262e
-
SHA512
94449e297e60ac3b6e3e5d3c2f7c6138825ca240541919518d5a8d6a4f793e4d497aafbc9d9b55d60e52f3711d278edefdbd54efa722f5972a2f6f50f87d0fb7
-
SSDEEP
49152:EePyvtaDVa634dx8Bw14BtjrhGTrBqherI:Eemtek6odKC6BdrhW6eM
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
Processes
-
com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e791⤵
- Checks CPU information
- Checks memory information
- Obtains sensitive information copied to the device clipboard
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:5091
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79/files/mobclick_agent_sealed_com.cyou.cma.clauncher.theme.v545c23270bea5d3764996e79
Filesize546B
MD5d26f4e45fbaae47c521f0d6bc496f61b
SHA144f894bb91fdff05e20ad564d7479f5b3d885bc1
SHA256db72ec36c09873e73e5b224e4bf5472a1838d072ba0f93dad6c0fd9916e81785
SHA5126e2d93173ee23e4221af67ea6db9082edb05a2848aae525ca590ffd164aeda2d2f16a831437fffeac819d21484c2be44483efa78ed2c407d63f3f9408ff12cc7
-
Filesize
32B
MD5633c973419110efe54cd8c621069acd1
SHA15fb97b6618e21065671f57473056beb7d6bfda4c
SHA256e01a74661a0fc00959d9f4a86e6070c9947c4f50a343df865d1684e0e21793c2
SHA51231d06be84c2d2c62144f7bb715a9701ae98981f4110059e8827f1fd1c180eff06c4d8605a19185a9979b4c82dd2d0c84da74f97eefe738167aff8e1d69b42d6e