Analysis
-
max time kernel
9s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
12-05-2024 02:44
Behavioral task
behavioral1
Sample
37d632577bd4582ddddc76c2db010483_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
37d632577bd4582ddddc76c2db010483_JaffaCakes118.apk
Resource
android-x64-20240506-en
General
-
Target
37d632577bd4582ddddc76c2db010483_JaffaCakes118.apk
-
Size
13.3MB
-
MD5
37d632577bd4582ddddc76c2db010483
-
SHA1
d4afaa65d29135a12e093e2c38d2a1fd4363015e
-
SHA256
38af6df612ca077f688b6e6a732c8278fc3b4b35eb1e5fec6f87045749fe4b7e
-
SHA512
3993b69251e028d3115635a8951bca098aa023574ed4fecb83e5fd0c033dda61658ffedd2e659da5f0e6103215b6e14de091a01bbfb85a12d90e4f834083cc82
-
SSDEEP
393216:yNqZBlvNNF7OsTnQNOmTcW2onQ08t8fhDLd7:yNqZBtNNF7yNFlw/2L
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.tjhr.www -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.tjhr.www -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.tjhr.www/mix.dex 4186 com.tjhr.www /data/data/com.tjhr.www/mix.dex 4186 com.tjhr.www -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tjhr.www -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tjhr.www -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tjhr.www -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tjhr.www -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tjhr.www
Processes
-
com.tjhr.www1⤵
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4186 -
sh -c getprop ro.yunos.version2⤵PID:4231
-
-
getprop ro.yunos.version2⤵PID:4231
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f91b6145bcfe7cc90f9a4d0a88a567b4
SHA16e98e3cb4327ae650f6f0d32c44a48be95ea8514
SHA256f892c30f011a36d8360c423f8988e6cbfccb544282b559f60852f50d2766c03b
SHA512fe801faf1618f480d698b2141edc7d84f3b74ae2ef6b94d2f97c3c2f1dad61ded8b8115d08ee23f046854fa294f921105fa6c37c72af083f6c9ceeb7546a20bd
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
92KB
MD5786c6f8ec9092e599af8ef6fec514938
SHA1f363fdaabebd22ba1f4cd91537931bf48ddbf6d9
SHA256b66457544999fb50b1289a5e7a8e2e4520652588f967bd60e4276d5480719539
SHA5121af58f55b8c5bd11bb11db47aaa960cf6125db2b4af5a0889bb3c332e21b666dff6a95673b6e57383ec4d164ff94c8a5b1b759d5ff990ed7cd63591a26bfd7b2
-
Filesize
512B
MD57b6d88624c3741cfb02f0b99b39f6e09
SHA1a8b421531d7f985452afb7e5901782b44929bbec
SHA25636a5eae7ac8f2b7bd19a45c6e9083055ad948d3b5f4942842e2f5b375273fa2c
SHA51243f8d5b0e0a334bfdb9f3e058aa6afcb18b72e2c92ac2de44de4ff4b61d7390bdefcbeff2c35f2e4fb55c32a2a7b4c4612956cf6119fa145756787d64905a291
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
72KB
MD581d295107fded256716ce0844c0b2cb0
SHA15f42160b6e93fd9bfbb265139b961e4b5f527724
SHA256e2f2bd9ae0d2b6e38843cba018cb2ba21f1ec2960ddc9eab0282ad3cc21e930f
SHA512099f33f4313bb3f11f2a3954287934568a3fe73e0841f125ebdb7cd788081c058b2f020c042500481f9da17a25693263de6d25d12cabe811c84e2b6457dfe530
-
Filesize
512B
MD58ce5c1a8a99c13446c71cdd8057d85ce
SHA121d0f7f96911d479a93bf893932cc9226c22cf44
SHA25628fb4ded44d64029274809821e2802441e1c7f10d71e64f723526e260ef86e4b
SHA51296836ba0af1cb1d25e0c5de4047508e37eee28f73c85ed7769ec8786150da8b53ac4cf5a6dcbe477b11c8443640bf59e0bae44387ac6d2f83b970c7f8bb356d7
-
Filesize
64KB
MD5330c89d1aa5f75620b751fd8133f6fe8
SHA1f2cb0c968ffad89f7f9f8c8cefbbc3c8186cb444
SHA256fc427dba7c7d7c4b2d2fe22769554c6abffd9afd37dc4240e6db762ece8c9774
SHA5128f88879d3901c574a75b00cbea5a88f5a12f2fd906f733e1142740e94e994e56b53d31bda03fad1173f3fe3cf0982bd72a658587529045f9b6800cb44775774c
-
Filesize
292B
MD563f77f99bd2c2b772a479923bde11974
SHA1c7632e7d301e4463fafce85f84e9c3d7da3fdbbe
SHA2564c76a3af64cdd2f8713ffe2733dea50dbe714d0ca41c17d1847ee5b62a7ca615
SHA5123aae4a89d1ed51fdd911cb367eb10afe3c2264e4222085891b18a60d5412f85d10bf5c8f3c6642db70abb9aa42732bac5c42c42ee32d587100f53c21b5beb16c
-
Filesize
32B
MD5f6bf4c3095a738c6c584318847396348
SHA1bf06300437a50d67d54f79da27e5cbb156a8aab2
SHA256928faa030a27735bf3c090f11ab5583810a2ce2a40ae445672e03407adfb38a5
SHA51249c16f32bd6ad597ea781886c2d305d7c67884e35a4a136fc383912a5dda7b2f07831bd8ca93072b253c54293329b0c78164c9de09fa244c596d6f9ea4eed57d