Analysis Overview
SHA256
6607bdb1506c49fac08cf410d318a2f95359f48d2a98ebb286cacccbc6c34d29
Threat Level: Likely malicious
The file 284dc0746fc8cb0660abc81237d8752c_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Removes its main activity from the application launcher
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries account information for other applications stored on the device
Tries to add a device administrator.
Queries the phone number (MSISDN for GSM devices)
Requests dangerous framework permissions
Queries the unique device ID (IMEI, MEID, IMSI)
Checks if the internet connection is available
Reads information about phone network operator.
Declares broadcast receivers with permission to handle system events
Acquires the wake lock
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-05-09 04:30
Signatures
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2024-05-09 04:30
Reported
2024-05-09 04:39
Platform
android-x64-arm64-20240506-en
Max time kernel
13s
Max time network
135s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Removes its main activity from the application launcher
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Queries account information for other applications stored on the device
| Description | Indicator | Process | Target |
| Framework service call | android.accounts.IAccountManager.getAccountsAsUser | N/A | N/A |
Queries the phone number (MSISDN for GSM devices)
Tries to add a device administrator.
| Description | Indicator | Process | Target |
| Intent action | android.app.action.ADD_DEVICE_ADMIN | N/A | N/A |
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Reads information about phone network operator.
Processes
com.thai.horny
Network
| Country | Destination | Domain | Proto |
| GB | 142.250.180.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | 0n2zmonqh5-3674d7jeex.ru | udp |
| US | 1.1.1.1:53 | 95u2eapbyd-92c7rnbcqzm.ru | udp |
| US | 1.1.1.1:53 | urk2eqzzwo-fw3buj27bs.ru | udp |
| US | 1.1.1.1:53 | j4704oyk0l-gz9p0ggetg.ru | udp |
| US | 1.1.1.1:53 | 0340cralws-23nu0rzmlb.ru | udp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.213.8:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.187.196:443 | tcp | |
| GB | 142.250.187.196:443 | tcp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-09 04:30
Reported
2024-05-09 04:39
Platform
android-x86-arm-20240506-en
Max time kernel
13s
Max time network
130s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Removes its main activity from the application launcher
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Queries account information for other applications stored on the device
| Description | Indicator | Process | Target |
| Framework service call | android.accounts.IAccountManager.getAccounts | N/A | N/A |
Queries the phone number (MSISDN for GSM devices)
Tries to add a device administrator.
| Description | Indicator | Process | Target |
| Intent action | android.app.action.ADD_DEVICE_ADMIN | N/A | N/A |
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Reads information about phone network operator.
Processes
com.thai.horny
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | 0n2zmonqh5-3674d7jeex.ru | udp |
| US | 1.1.1.1:53 | 95u2eapbyd-92c7rnbcqzm.ru | udp |
| US | 1.1.1.1:53 | urk2eqzzwo-fw3buj27bs.ru | udp |
| US | 1.1.1.1:53 | j4704oyk0l-gz9p0ggetg.ru | udp |
| US | 1.1.1.1:53 | 0340cralws-23nu0rzmlb.ru | udp |
| GB | 216.58.213.10:443 | semanticlocation-pa.googleapis.com | tcp |
| GB | 142.250.178.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.212.206:443 | android.apis.google.com | tcp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-09 04:30
Reported
2024-05-09 04:39
Platform
android-x64-20240506-en
Max time kernel
13s
Max time network
131s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Removes its main activity from the application launcher
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Queries account information for other applications stored on the device
| Description | Indicator | Process | Target |
| Framework service call | android.accounts.IAccountManager.getAccounts | N/A | N/A |
Queries the phone number (MSISDN for GSM devices)
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Checks if the internet connection is available
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Queries the unique device ID (IMEI, MEID, IMSI)
Reads information about phone network operator.
Processes
com.thai.horny
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | 0n2zmonqh5-3674d7jeex.ru | udp |
| US | 1.1.1.1:53 | 95u2eapbyd-92c7rnbcqzm.ru | udp |
| US | 1.1.1.1:53 | urk2eqzzwo-fw3buj27bs.ru | udp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.178.8:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | j4704oyk0l-gz9p0ggetg.ru | udp |
| US | 1.1.1.1:53 | 0340cralws-23nu0rzmlb.ru | udp |
| GB | 142.250.200.10:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| GB | 216.58.201.110:443 | tcp | |
| GB | 216.58.212.194:443 | tcp | |
| GB | 216.58.204.78:443 | tcp | |
| GB | 142.250.178.4:443 | tcp | |
| GB | 142.250.178.4:443 | tcp |