Analysis
-
max time kernel
179s -
max time network
178s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
19-05-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
5aa6fb7b8a0b68937e34b1a930a8e627_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
5aa6fb7b8a0b68937e34b1a930a8e627_JaffaCakes118.apk
Resource
android-x64-20240514-en
General
-
Target
5aa6fb7b8a0b68937e34b1a930a8e627_JaffaCakes118.apk
-
Size
1.3MB
-
MD5
5aa6fb7b8a0b68937e34b1a930a8e627
-
SHA1
70d500bfb01cac01f231d7ef23d938243fd76280
-
SHA256
008f796efe5532aebe2f74e19ee3918a28d880a502e0d59b6dedb3edc14e0b18
-
SHA512
ac4cdd704b92c352147585c3c95b8b94257d43801bd28d1cc485b80fe7907e2d14e4a09771660e9cdf703fe5cf450bc7d9d2e90029fac2d2fa32ad0c4d6e1c23
-
SSDEEP
24576:UcEoL0otaYtXMNSprkM4FqD5Bl0ZHqU+vjDo+cIjE3Iq/13tdHbZKm51Ob83/:HQ7YtzrkruBl0ZHSjPJjE3Iq/1XHNKmn
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.owtv.ffmq.xnbpdescription ioc process File opened for read /proc/cpuinfo com.owtv.ffmq.xnbp -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&com.owtv.ffmq.xnbpcom.owtv.ffmq.xnbp:daemonioc pid process /data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar 4277 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar 4245 com.owtv.ffmq.xnbp /data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar 4346 com.owtv.ffmq.xnbp:daemon -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.owtv.ffmq.xnbpdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.owtv.ffmq.xnbp -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.owtv.ffmq.xnbpdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.owtv.ffmq.xnbp -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.owtv.ffmq.xnbpdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.owtv.ffmq.xnbp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.owtv.ffmq.xnbpdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.owtv.ffmq.xnbp -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.owtv.ffmq.xnbpdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.owtv.ffmq.xnbp
Processes
-
com.owtv.ffmq.xnbp1⤵
- Removes its main activity from the application launcher
- Checks CPU information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
PID:4245 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/dz.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/user/0/com.owtv.ffmq.xnbp/app_mjf/oat/x86/dz.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4277
-
com.owtv.ffmq.xnbp:daemon1⤵
- Loads dropped Dex/Jar
PID:4346
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD523ba0b249042b7ba33e92c0199b0ea4a
SHA199b13ee9f7307316c2337953fceed87e9942b794
SHA2561ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA5120cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861
-
Filesize
554B
MD5e72d834a1215774e5d05c115e6286068
SHA116c5657a9ad0224f17741730fa440282bdea2702
SHA256b3340f5e1031d168ae27e3120c749f0dd66d11297a8ee0c8c304a853df4c2ef2
SHA5123071dffb0c2a64b3de872134133cbb21edf76ef75b03c238773420ff4a2d1e9097e8ea7381aea63f4817b810ef7c758ece3ae3944e3546bc890c5bd73eeb7db6
-
Filesize
105KB
MD5293ea5f01e27975bed5179ba79d80eac
SHA1c5b0806a537fd1cb753e11f1a9684933317716b8
SHA2568d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD57591af85b6685ecccf0ce78042a76cce
SHA1c05bbe9dcb62d8100839c9c595d4cc61c69398c7
SHA25608e85eaefabdaa92412ade300cf525e88e8ce50830058f223d0dbcfe039ebfeb
SHA512c1e6300aff35322a417c849438f6ed9a3afa990ffa5b80795cdd876331ad98b109f20254f4417420fc200dda7bf59b7b020e533105898ec0ba78d95c1e708d24
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
60KB
MD5f3bb9af4d73c1b70ffdfed467c4c7704
SHA1d0fb1b03c446157f21ce53703066b571c07bf8bd
SHA25694e1b0b714f46f523d8b398b4b31bd7722fd965d143efa8d16d7495f659ca823
SHA5129ddc88c6978d046b6e1c38163937f440ad9d6cd48f71003df85da35528bbee263bc9e8ff925d42930e89d1b3e1fa04b62afcdf1618aee9796b6be2ab696dc160
-
Filesize
679B
MD584ce52dd2dcf386366d0c6c6d1c6c35c
SHA11e042b634d598683a34660bf3bb0d93a43e7f2e6
SHA2561346f45464159dd1e22a5a87dc62d9488277c74530aeb3aa7acef3c9a40540e1
SHA5127a78b23f6cb27f9cfb7c8688e7862cf3b1d10505c3e9547481e301d9203f601949a601f86fe93802b56667dfa6676a4b1f2f66c42fe170eccc3c24584a72d8bd
-
Filesize
162B
MD571372be36057c2e71f3b4dff8a196a34
SHA1e997569284b3e80f751c2732865d92f718a856c1
SHA256a2d3ebbca00ba1eb4ad8bf7f2177db4b912f36e69a7fbe6ddbc727b360f1b890
SHA512245e0d221aebb5b5363d00e3e95440e8949c9e358b5da6c4eb152cd0516cf72a8a8562939d64c79d99761c2df7ff898dd7ce63d4f9ca7dec52197cf688d13cc8
-
Filesize
859B
MD5b2afcbca455af12a16c2f8e668b954ae
SHA1789e284e07c1d699611fb16c7aa70beb16d555d2
SHA256aea361fbd204cf68bf71d6095a9860f4f2bae6c6e83a73f1c6c9947c309f58a2
SHA512a65c275daea116d008d6911275fc4d3cde62952c06a9fc655b8774a49e051f135a66167b2e80406f81c6f98b85ca3875e1fadea189f8e02dcc7d426292ded4c8
-
Filesize
415B
MD5cf3a1fe3c3ef1aa20040aef688d489e1
SHA1faa61a9a241aa464bd544feb88af17f4d39d9cf1
SHA256207f8bdb0392447832a57d61777d7594c55ddd68964acc7d2ad35e8744b86c15
SHA512167033494342d1b9fcb0ea91ddf90dec57044a6b0790eea93a691ab567a9277efb150f751b3e926df8661677f5537dfa3c4d3ad627a78a9bc550e063ab58a199
-
Filesize
248KB
MD59b47e78a6ff90cce5755ce4742047627
SHA1831b24aa9e116eb8d7065efd430088d419dfd6c7
SHA25630d7699b73fd7f276945415c405c12bff69c5958d12f56265a768443f6fd8cae
SHA5124587a5b26f13cbd0524eade71ed29203fc55029fe150fce850016aa7d9c578623cdc4b6a551bed3dec9e31a39563f8927cfcc9d21e2d83c2c781808b958446fc
-
Filesize
248KB
MD5a54a18b58c6720991c021f433dfb2a46
SHA1d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA2563dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc