Analysis
-
max time kernel
178s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 06:38
Static task
static1
Behavioral task
behavioral1
Sample
625cb702476486e20e7d86d3616cc79c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
625cb702476486e20e7d86d3616cc79c_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
625cb702476486e20e7d86d3616cc79c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
625cb702476486e20e7d86d3616cc79c_JaffaCakes118.apk
-
Size
728KB
-
MD5
625cb702476486e20e7d86d3616cc79c
-
SHA1
46c3e3a4d41ec933169c257b67a77a013f9249b9
-
SHA256
d322d9e216c5479453051cc3d96927efc827c8e0ca6de62a6963c2dee4760e30
-
SHA512
5555c3ce8b4fb2478e3e622cc4b8f091ace4fc8cb14137cfb36056220af652671057f4a3821f29f2a9a63e33c6dde96168bbe6c87053ae7e093649a88a8c48a6
-
SSDEEP
12288:4IxKDEZXz+P96X3a86Df4nUErWZHYbnPYGoPG+4ta6Zv:4IxKU6P96X3pUPHYbnP/Y4v
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
com.pro.fla.offdescription ioc process Accessed system property key: ro.product.model com.pro.fla.off -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.pro.fla.offdescription ioc process File opened for read /proc/cpuinfo com.pro.fla.off -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.pro.fla.offdescription ioc process File opened for read /proc/meminfo com.pro.fla.off -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pro.fla.off/app_ttmp/t.jar --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.pro.fla.off/app_ttmp/oat/x86/t.odex --compiler-filter=quicken --class-loader-context=&com.pro.fla.offioc pid process /data/user/0/com.pro.fla.off/app_ttmp/t.jar 4326 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pro.fla.off/app_ttmp/t.jar --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.pro.fla.off/app_ttmp/oat/x86/t.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.pro.fla.off/app_ttmp/t.jar 4254 com.pro.fla.off -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.pro.fla.offdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pro.fla.off -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.pro.fla.offdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.pro.fla.off -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.pro.fla.offdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.pro.fla.off -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.pro.fla.offdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.pro.fla.off
Processes
-
com.pro.fla.off1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4254 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pro.fla.off/app_ttmp/t.jar --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.pro.fla.off/app_ttmp/oat/x86/t.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4326
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393B
MD5f5247242797c35fbcfe5a02e7f71d547
SHA16d30eff24ada674d35495b763e611851240e953e
SHA25623abb80cfd94b464bfa22654c451d40ad0820854f03752c5670a45d2a0c0289f
SHA51237ca22734b25d98dd2c9c204fa17ecfc29aaecc00294a9cd69c2e09ebb7b444989a588359b4878e17f4eb1bf122579e8ba78b3df3f9bcbc9b5fbac63da4f078b
-
Filesize
271KB
MD5f06ab1caa33597d6410dc5edad0bf259
SHA15407d16f2d2704565ab532a2f54520fa3c2ec755
SHA256095b2e7e0a7e3226fb6a43c90d5d0b7db59408e28991f3f7b970d2baef79a9cb
SHA512e9dd43fea9e081281fc721ff4ceeb7959085cdbd4b8300227a2c2f4300f19ad7ecae4bea552cd95473ab59e347811d3ee1ac1a063a9c90e37839af2ecbbe4138
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5acb682c7e82ffdac6a1038451a150086
SHA1a4e3800285d7444c556bf8ec42c70061c52113e4
SHA256de677107511928a0c357079c4ce9453b06f5371a5c5d377d3958be9d9b8f38f0
SHA51284bd145938bde0c7516f7f83ec8d023c0a1af9ac5128dfa383cb588b20449a99cf9b0fb949d7d42ecf3708d679a458161d6f7f5cf75e0e6b03957ce70f111871
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
92KB
MD51e82a1a524aac35021ec4e5047ff4b78
SHA1bd61633f3ab038b0d345597dc2c5223dd08ea4c3
SHA256f4b6e943a0c015530fd7eb44ef7f654e6aef742e5e721429a9a2a8880b253cfe
SHA512e754535c3459b24b6cbd913e19bb4c5ed4d5197ae223629d38e1a4a31ff6b5d8a94f22ffe7d87e39658fad47f3254bc028927952196fbd0c4465fb13b907ae2c
-
Filesize
575KB
MD53b15dd60fd2d407da2f26722c6849aff
SHA186de0a56f144df75ac2b06a6bafad5155166366b
SHA25618ec562cf1e1c3325b3e252d80725f92990ea397632aeec32ef0a5a8bab27408
SHA512ccabbeead605602a4ecaebc69d7a7b0dba9e4e4a80383cab4ec79ef68f6b9a68aa0abfef0f4b15a42e878c3d6e0b1cc19810cc805fc600dd5bddb8df10df0ed0
-
Filesize
575KB
MD56a6cdb4b514dcc313ebbbf4677eef772
SHA181b1d963a7c7a385193a28cb0001ac0faaa57b87
SHA2561e706adcc6521f04efabff9d8a2fa193ab6540b88894859320c1f34fdec57310
SHA5121777ff00aca9205380eb5de58fd40a0133ad44d73286435f7d19c40c3e3bff56349697fd417dec8365ba071e8ebdf1d4e153454076d870efb73fe5bad1054b2b