Analysis
-
max time kernel
3s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
14-05-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
Resource
android-x64-arm64-20240506-en
Behavioral task
behavioral3
Sample
plugin-deploy.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral4
Sample
plugin-deploy.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral5
Sample
plugin-deploy.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
423275acf0ed96c26ed3d108fcf89644_JaffaCakes118.apk
-
Size
9.1MB
-
MD5
423275acf0ed96c26ed3d108fcf89644
-
SHA1
cc8a00f93f9fbe09da7ae1427379ea1e8ddbda1f
-
SHA256
0764d827c03a76a82d8cd263c4cd78684247eb1f0d9d8d0599a4f1f18fb32b18
-
SHA512
44c4694e4bc1d1655554deccd2dceff1bcb3baf1353398f6a711e76aea3b7061bd3d419e5c0808d691b3ddee805a6106d855689817c9aac14084537f71c2a1ce
-
SSDEEP
196608:3FhhHFAVUEF2WoQf37pI94BY3tkxilKyuVwi1rnodRccb+nQ+20v+dvKDsj29lzG:VzlAKkVdNAttGUuVn1rnoHccD+20YCD6
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.baidu.zuowen/app_push_lib/plugin-deploy.jar 4327 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.baidu.zuowen/app_push_lib/plugin-deploy.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.baidu.zuowen/app_push_lib/oat/x86/plugin-deploy.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.baidu.zuowen/app_push_lib/plugin-deploy.jar 4276 com.baidu.zuowen -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.baidu.zuowen -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.baidu.zuowen
Processes
-
com.baidu.zuowen1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4276 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.baidu.zuowen/app_push_lib/plugin-deploy.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.baidu.zuowen/app_push_lib/oat/x86/plugin-deploy.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4327
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5394bd5d7d2d595c19a27fa95959efc23
SHA11c19442c8f05af69d8cb01b4c0836dc836c66b8f
SHA256af090825241b7b0c0fab2f6fb72601204fafab385076d3a54c00711a52784e27
SHA512ef9b2484f0e02c6d53ce76b4daf0182406fe72674bf051abdfd8f5148805342c5468a48d92eba5ebee3172cb546907a09b9e731f6b60e762394514f8e56aef82
-
Filesize
174B
MD5a26e6353e7f666766a37bf1454cdbc64
SHA128289502c5514f908ac6a976dd8f5cf4394f79bf
SHA2569730af348d9c0d7b366e8eaef67b03f88762424539026f5018db2283fefac855
SHA512f1a5f41fe956a591934cf36907483b85bb105b3f557da67791c12cd81c99632c39d7bc740007f91b1b6b3336b4766304cf02c0742f3f4ed0aa89ffc475ec1f98
-
Filesize
533KB
MD58baab4affef1f7aa4c9b43f59205b5df
SHA114aee85b8f086144be31c2e05266b9e0ed7630d7
SHA25627da44e5bb58606ac446196d8aea16a0bae93252064fac017f91646efe6dafdc
SHA5120668400ccdb91a42eb10b1ecaeb1821934aca9598812b0f9c7247b1196c2408edc520c4fab7fb967d185a275bb10b7aef1bc4040c70e4e26445609204ab5f350
-
Filesize
533KB
MD5cdfdbe1021a6269c6c5d5753d8f91f06
SHA1173bfd5a9fc6681eceeccccd73460076f94906c1
SHA2563923d4f2b26e4969819e2c791605959ae7394b91ccafdff76dd765b2d61a8f18
SHA512b80bf59fdb2a19fbfbd53325a86d71df0912ce4e7c86b59813528b863c500f816cb7b7ffcb52881cba3475b0ebe3565ebb8864c59b507f214dcefd833ccf807e