Analysis
-
max time kernel
134s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
24-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
6d4b76b7340aca773e1428d9ad38729b_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6d4b76b7340aca773e1428d9ad38729b_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
6d4b76b7340aca773e1428d9ad38729b_JaffaCakes118.apk
-
Size
20.8MB
-
MD5
6d4b76b7340aca773e1428d9ad38729b
-
SHA1
b80487db2ab07d47f33a767cbe25f9b895ce8b71
-
SHA256
f975239453fa2d8a5f9a0f8907ae382ffc0f0296d19e02e585722515874ba47a
-
SHA512
7da2f1634737ec589fe763dd1b13665dba59584470791966a7d27b0c6938148d4aa9df512782376019fdf55d2a6a92badb121fd5df27b20fb7dea5f6ed01a34a
-
SSDEEP
393216:ed8OLLbZlttIJNJyiShjYNN4M04lQNadjYfdKZ4bmvgCLXRQnF22/Btp4YbjB1CA:ed8OLL/yAphDQQM1RZ4SnLXWnJBX4Ybr
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.kingitapps.swordofdragonioc process /system/app/Superuser.apk com.kingitapps.swordofdragon -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.kingitapps.swordofdragondescription ioc process File opened for read /proc/cpuinfo com.kingitapps.swordofdragon -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.kingitapps.swordofdragondescription ioc process File opened for read /proc/meminfo com.kingitapps.swordofdragon -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jar --output-vdex-fd=83 --oat-fd=84 --oat-location=/data/user/0/com.kingitapps.swordofdragon/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&com.kingitapps.swordofdragonioc pid process /data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jar 4479 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jar --output-vdex-fd=83 --oat-fd=84 --oat-location=/data/user/0/com.kingitapps.swordofdragon/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jar 4326 com.kingitapps.swordofdragon -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.kingitapps.swordofdragondescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.kingitapps.swordofdragon -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.kingitapps.swordofdragondescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.kingitapps.swordofdragon -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.kingitapps.swordofdragondescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.kingitapps.swordofdragon -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.kingitapps.swordofdragondescription ioc process Framework API call android.hardware.SensorManager.registerListener com.kingitapps.swordofdragon -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.kingitapps.swordofdragondescription ioc process Framework API call javax.crypto.Cipher.doFinal com.kingitapps.swordofdragon
Processes
-
com.kingitapps.swordofdragon1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4326 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jar --output-vdex-fd=83 --oat-fd=84 --oat-location=/data/user/0/com.kingitapps.swordofdragon/cache/oat/x86/1582435991586.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4479
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.kingitapps.swordofdragon/cache/1582435991586.jarFilesize
9KB
MD5e8e0527a01aefdb89afd2c508f131da1
SHA1f1103e6b260c657ceb3d95f1b023af3fda8b133a
SHA256f809447486f89fcaa74f87e06d126d103d37eb2b3157e88f2c06d989b2c284ce
SHA512fb53683a83f1068d0f94567b156e6a8910c45b1b5f33db919f7e0b9c55eab28507a235ef76d44d5b549599ea3b54dbc00496a633339d276a80f395da938d6d34
-
/data/data/com.kingitapps.swordofdragon/files/Save.iniFilesize
229B
MD5798465ab3bfc9d10d1cd04afa64ab2f6
SHA17ab73f1b6312bce79ad3b89fefa229a319d0da80
SHA256d02ff209d4a2cd20ae4e2558c7b32da243f7460e2916aeaa1f01114d01685b0a
SHA51221525734bc3561284eac284127bbeb6e45defb82d4c12e4f02cc231154d6f8f7378e363f04de8c463265dd7210657a0524acff9a08e1bb8c8f510d4c112023d9
-
/data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jarFilesize
20KB
MD52048eb6124a452540ee51dae4145aadf
SHA1d05005b2cd7fe4cd652b0d7fd1bdac2c19d51451
SHA256105c54b6fe3f25350e92187467761598e4c21d62b1091b77d091f65f3bd98864
SHA512bb6cb3853dd2a5d0701e20607d4e153ae201268dd2e5e2d06cc2df208b3b4dc50132a4ab428251b1644d2399fcc717662438d082ff14203387bab8794109d44d
-
/data/user/0/com.kingitapps.swordofdragon/cache/1582435991586.jarFilesize
20KB
MD5fde2ee00cbd121cfab5290b078aa3ceb
SHA1e2b77d5320e155e413d040a8c20020962065b2f8
SHA2562897b0812077c654a9b3fbb0b6303d5cde681eeba7ad9981de65716c7810d685
SHA512a9326aff8e454a2b4ac09984ef2a65fddd4dc146b4c44d839035549bff8c9fdaae490326d0b018f76c1ca2e4fb25426d74f550ca0950982fba632a023af99a56