Analysis
-
max time kernel
56s -
max time network
173s -
platform
android_x64 -
resource
android-33-x64-arm64-20240514-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240514-enlocale:en-usos:android-13-x64system -
submitted
22-05-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
65cec659efd5ec055868aea18c2629df_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
65cec659efd5ec055868aea18c2629df_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
65cec659efd5ec055868aea18c2629df_JaffaCakes118.apk
-
Size
5.4MB
-
MD5
65cec659efd5ec055868aea18c2629df
-
SHA1
fd4e0ca44ab93f4ad5488d88eb549f12049b77e5
-
SHA256
8fbef0066adc2a9b5d934133499fe4d3edcbb24a9ee729bf787b7d17633e992c
-
SHA512
93a6036442b4dde5297b0cbe08744fc2daf4b7b5658f603545acec1c00bd0f67cc04cd91ffef022c85a3c6be0892c77b25837f535f9dd4a91ee073019cd13d9c
-
SSDEEP
98304:gRb+vYCKAYJ4L826aBBK2OJERaRuY+YXGror6iARV530XE0:gRxK7BKzRufcPGi3
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/app/Superuser.apk com.km.beachframesjgzxoooztijl -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.km.beachframesjgzxoooztijl -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.km.beachframesjgzxoooztijl -
Loads dropped Dex/Jar 1 TTPs 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /system_ext/framework/androidx.window.extensions.jar 4294 com.km.beachframesjgzxoooztijl /system_ext/framework/androidx.window.extensions.jar 4294 com.km.beachframesjgzxoooztijl /system_ext/framework/androidx.window.sidecar.jar 4294 com.km.beachframesjgzxoooztijl /system_ext/framework/androidx.window.sidecar.jar 4294 com.km.beachframesjgzxoooztijl /data/user/0/com.km.beachframesjgzxoooztijl/cache/1664557424545.jar 4294 com.km.beachframesjgzxoooztijl -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.km.beachframesjgzxoooztijl -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.km.beachframesjgzxoooztijl -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.km.beachframesjgzxoooztijl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.km.beachframesjgzxoooztijl
Processes
-
com.km.beachframesjgzxoooztijl1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4294
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5dfb68e70e8eb84d844c9ce623ee069c1
SHA1369e761858a904fe9fb89efcfc9bd3e6e56ee44f
SHA2568ba015cb192f34326e6a46f765c6712d87c3797661541275c84b9a30ee449eec
SHA5120d5f8ff91d3cd5c976cadf774b8d5cd6f276793b9eb9f3d8e7168eae122b0bfcffd833be9762de441d4b52f7bb3eb3850479aea37ac327be9b71910c6fdc566a
-
Filesize
21KB
MD5722310b17c81cc3d780d23e1a63eb450
SHA10a0c1a939f923570e5da88aa5c7b105052f056e3
SHA2569f2d7ff525ca785553557c351812252c0beface31440517e2f19929fe76472b1
SHA5121a48e9383a0befb0c6b4755a8b56f352fba317910308f701e13ce8189c465cade6b0af510165d586745f1913a61cc68f91395949202394336a59c34596691a91
-
Filesize
36B
MD568ff5569d448166c0ef004e930e9aff3
SHA1a06400e2ce51f16371facdccf0b37c684c44de60
SHA256f50906a83552e7ec324f7cf83ce5fe66645153d439066341b81b4f6c473f34de
SHA512472a5e35306421d17ddb4e308ea398e5b0d419351cb477377992279a051e179aefcff04a72fd09dde774cffd830a63f46b4c6f4a99f24879e6176024177ce121
-
Filesize
123KB
MD53056e1bdb7d4e19789d0319eff484bd0
SHA16791ae47aa9466fe0bca27ad6643f846853bbee4
SHA2568e6331a07c9f2ac139214c527dcaff2c82d126bbe7bd3420cdc36d6a8c9204b0
SHA512c790980fd68d9f89e32743bc28846807d5e5947c555f494de47714dec5cbd0c08d81c3260fa463759d1b17a953af3c44ec30b14fb08bf6b29db3837346c9f658
-
Filesize
25KB
MD529469324e59dfcc052f24b5af4e7b2c4
SHA110c1e17ac6f598037bb51baa07945663645de4eb
SHA2569195dc6a1c75a841384050240dfc972e48178964993fba6619788625f4b40d1a
SHA5125e27c2b1431369a248298f2f749136a575005584f9999f2a4c204a0c47adce2e33c8df9f058bdafa1bde1c99e46d175560cedfcddcd8581718ed1d9973c37cc2