Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
16/05/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
4a518d81c4d79935d56d5e11a677f333_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
4a518d81c4d79935d56d5e11a677f333_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
4a518d81c4d79935d56d5e11a677f333_JaffaCakes118.apk
-
Size
1.5MB
-
MD5
4a518d81c4d79935d56d5e11a677f333
-
SHA1
cc738d9c6d0df420a4b85da9fd21db87f516c2bd
-
SHA256
27e6fd78d0823e01c889ff1167032fdcc6e862566a459198a0da5de239c35fd1
-
SHA512
ffbbc3532bca96f24126fea4cd7ff63728be854731846469bab46c2e79001c7600b47d29623561aa18e85242162a2964c0bc15227d9385d5bc89ec08db0ff4fb
-
SSDEEP
24576:y/z9PTC16IpezVanLKwzF6OZS3qUDYoxNRXorMT86adRskrejMmoQwTWTKrrq2:y/z9PeQIpezqKl3qSZRXbgAHjMtWOvb
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.train.time.search/files/searchq.jar 4317 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.train.time.search/files/searchq.jar --output-vdex-fd=59 --oat-fd=60 --oat-location=/data/user/0/com.train.time.search/files/oat/x86/searchq.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.train.time.search/files/searchq.jar 4247 com.train.time.search -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.train.time.search -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.train.time.search -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.train.time.search -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.train.time.search -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.train.time.search
Processes
-
com.train.time.search1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4247 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.train.time.search/files/searchq.jar --output-vdex-fd=59 --oat-fd=60 --oat-location=/data/user/0/com.train.time.search/files/oat/x86/searchq.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4317
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD58efce37f082b45ebe7c54405da08240b
SHA1dc4e23ffe3311e67066d21d3530dd877134f4d69
SHA25630eb3fae3fd38035471ebfb0e0d9f22ce1cf09d5ad15fa00240478685c1afb87
SHA512877d876ac517d4559f86d64da3ebc27e3130ee7356554e65717333d914139b11d5b511338a550306ed9ba9c7a8e141a90695fd6f4eefdb5f272ee7ab390a097d
-
Filesize
434KB
MD592026f61f057ab764b3c16fc3dcd5a34
SHA11687eae89e0d009ff1ef5a5d276caa95bf571803
SHA256f55c2b1ebfe4d68628ae74c1f3631347887000fd0452388e9954667d70e9bd3a
SHA5129cd00488888329a8e30393001e7d61a1c50776d36b57e29d71895fb254e732e31a35dd5a08d562e76adfb10222853600f9ce8f06498ce81975d90eef53110d5a
-
Filesize
434KB
MD58d5cc189ea7ca0e8600200381c0f06be
SHA1718bec6edf420d2b411e0f355d2937657f0d4387
SHA256184e05131c2747b1558807ede0c5fe5ef766b649c0435e0ac8b86316652a273b
SHA51224ea4e45147d2b3c391b09ad76d784e1c8ea1c0e8e03aaa23d90a12756c1204fc0df65396c97bfb3a8e357d247d1969e31833f6bac346d2fa6e371930b678484