Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
02/05/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
0d9743ac20f19e0f7bc9758e098e84e7_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0d9743ac20f19e0f7bc9758e098e84e7_JaffaCakes118.apk
Resource
android-x64-20240221-en
General
-
Target
0d9743ac20f19e0f7bc9758e098e84e7_JaffaCakes118.apk
-
Size
6.3MB
-
MD5
0d9743ac20f19e0f7bc9758e098e84e7
-
SHA1
a0dcc88867182a3e797ae79f2bc23ac8b404dda1
-
SHA256
9fd5ed7806f3b54725644a59e24d2d17109f513312d85b8317f479065bf03e9f
-
SHA512
24f21fa91b120e9d803d537c0670f0f2d9614526fe6944aedc9b88ef6e08438cdf99539f1df4af9119e6872e3713d41a35aacab4f0af12e32f17819eca653be3
-
SSDEEP
196608:VbJIeGGrCetOl3t09MepmBdD1aUhdaOtZSceGDv/cw2spbQb2bRfh3:Vbfw3wMepmBdD1aUhdaOLrj/sgsibRf1
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.wenhua.dingjintouzi -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.wenhua.dingjintouzi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.wenhua.dingjintouzi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.wenhua.dingjintouzi -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.wenhua.dingjintouzi -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.wenhua.dingjintouzi
Processes
-
com.wenhua.dingjintouzi1⤵
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:5048
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5fd1ab68084305d82e07fd571996e0f73
SHA158156950ae65e8232130174a28155f09dc1e3ea8
SHA25602368e0b732179d6e28445b3521374eff8d77f13a2c1e01cdccf5f18ca84dd4e
SHA512df3527388f71f8f993b863b6e8e60ce554ccbc674e818458407480659e2f8bae9fc747c514982a1b7332fad05433d371d44b8dc053721a35109d9206190ef17c
-
Filesize
512B
MD5f09e7d53da41cb2b93ee91f087c16a04
SHA1f5b3cd40d9677c5524da1e4d78097debef52d6ce
SHA256f6085af11f86d5c2be80e9f2d114ef01908e311413c5db7126bbf01635e2b60d
SHA51235d19f13c6fdc4c07038f5e0a02a0388ecf63ee4ed410226f40642a3115ca782711fadadbaf69f7effefd5ee8d2c6e490e788c963df8c992b156789a3a6d4634
-
Filesize
8KB
MD511688dcfcfb7f6c27935908c93bcaac4
SHA1447387240f98a04ccb17bb4abaa61051b87c09e3
SHA256e1a6cce1bb90de7d692478b46bb58060b7bc346d7d32d39f7f9e1ad648ffddf7
SHA512e8ccdf6b1e74061dbef1bed17701f93c8c40f30fd0308f07a08cf94aedfb8d54d3f1600036f70fc1f1629a9587ee08d5d4a61fae73b5ec6b3184ae7b0311738a
-
Filesize
8KB
MD5fa65a63a500b790ca4d821e6a5931542
SHA1e555edfcdc392f24e19a58475811fb756e2b3f6e
SHA256bae942d5f2b57559f1f8342985090360c672d4f6eaa731cfb61bfcdb79b3c0c4
SHA512b72b5a7db12d018b120496aa305d6d2202696564cb75b84f9d5ba50d7530a629e2dc141c11c42202973089494082d26e6434a2087fba546d8a4930ea15b30e87
-
Filesize
8KB
MD572b08e9e0b44fd7ea561db672a2489ef
SHA1bd2a917be08474ed95e500099f89509726c1ff35
SHA25609c6e550002dc9438644d15b1a5e52f7e40f206b6d4e2e1b891864111332f2e0
SHA512e34dbe69526413ffba47fe58d2902f8e4d8a6ede4f96de4c63e4f7112165c5e4d0cfda6400c8b762000e5aee3a1759ed0157c4ebf3a2cb92eee0d3e8d81aba79
-
Filesize
12KB
MD55ab94ccd8e5f779013667cf7f1e919c2
SHA119bf69fdb0f4378b67506722f6996ce1abb7c8aa
SHA256d4f1bbf715182c35439478c6fc9a082acd9f7a8413a7c2ecc6d51761f0d5422f
SHA5121f67b5036a460d59ae6cafa101da5e60c6c9177601d0f6c4b819d5dc5b7a936faa6a9d98969c791e1a90c3bae25070b7e79d891413a0a8d2026e25354065a2c6
-
Filesize
12KB
MD5b3c4f7a3912e0d2bc6172f3a174a5dba
SHA1af30c8e751da97cd7e086885323cd160d35b2e58
SHA25684e765c97fde0372045c44e21fed4596bdc898f8d3667a7cbe5376729afc8078
SHA512101c301ebc810b67e707a1d0b602c533633bb71baafd31564c60d8bb93cf5dc280c2721fe981b4316b83019c7252d60374c413577c00a402355259a295030fd2