Malware Analysis Report

2024-07-28 14:46

Sample ID 240528-xla3aaga3z
Target 7e0671fc66f9a482000414212bf725e3_JaffaCakes118
SHA256 13569bc8343e2355048a4bccbe92a362dde3f534c89acff306c800003d1d10c6
Tags
discovery evasion impact persistence privilege_escalation
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

13569bc8343e2355048a4bccbe92a362dde3f534c89acff306c800003d1d10c6

Threat Level: Shows suspicious behavior

The file 7e0671fc66f9a482000414212bf725e3_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion impact persistence privilege_escalation

Loads dropped Dex/Jar

Registers a broadcast receiver at runtime (usually for listening for system events)

Tries to add a device administrator.

Checks if the internet connection is available

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-28 18:56

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 18:56

Reported

2024-05-28 18:59

Platform

android-x86-arm-20240514-en

Max time kernel

154s

Max time network

176s

Command Line

com.tvone.untoenynh

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar N/A N/A
N/A /data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.tvone.untoenynh

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tvone.untoenynh/app_fogdqxpss/oat/x86/puqiklllaj.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
GB 216.58.213.3:443 tcp
GB 142.250.200.14:443 tcp
N/A 224.0.0.251:5353 udp
NL 37.1.207.31:80 tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
NL 37.1.207.31:80 tcp
NL 37.1.207.31:80 tcp
NL 37.1.207.31:80 tcp

Files

/data/data/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar

MD5 b30f63d751e58accea36d408ed680632
SHA1 3c8afa7e98a674c3be9e0f9ae37c0dd408b09e2c
SHA256 75ef5147279ddef2e7a9cb0c264b9055ef638904dfb93c3a5faef977fdd23326
SHA512 7fd4e755f5fb3619d301babcc0e7c854c51129bfc1db7319fe899398b4c5c62646b4687fb04bf0a3b0cf08d8bfce39e4ca2cbac3ecdbebfa4908dd3374475d13

/data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar

MD5 cfe79f8009a3b37a758d886f089cd9a4
SHA1 36e2c2f751eace6a3f57fd9e2f3a39052d5ec2b1
SHA256 62b6663264b1bf3261faa8e7cd444f100ce73644522533a95135861f325f576f
SHA512 01259731514f79e22dc4e314935e5c0e1e8fa9861ff18ff42ad52aa20a64606aa48934310199b9a2e217ecfee2a9ad551f64909a929a4d591e90ea18423c4727

/data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar

MD5 6d99e3cdcb65ef5b9371dcccde3b79f6
SHA1 f3d1362bfdbe4aa794bb4ac3ecdd9149bcf6c2e5
SHA256 8fc33db2b981bbe96b32f72d11a1299ab91370ede9e6568589a7ca175ac414ca
SHA512 1f2d2d2a232f2c73670a5db0886e4b6d892f623737a340e5a24718b19604d5a538543977a6ba62836cb3188508fb337424c38d498ae0190effbb3e98cfe158e7

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 18:56

Reported

2024-05-28 18:59

Platform

android-x64-20240514-en

Max time network

157s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 android.googleapis.com tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
GB 172.217.169.14:443 tcp
GB 142.250.187.238:443 tcp
GB 142.250.200.2:443 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-28 18:56

Reported

2024-05-28 18:59

Platform

android-x64-arm64-20240514-en

Max time kernel

154s

Max time network

178s

Command Line

com.tvone.untoenynh

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.tvone.untoenynh

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.14:443 tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
NL 37.1.207.31:80 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 142.250.200.4:443 tcp
GB 142.250.200.4:443 tcp
NL 37.1.207.31:80 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:443 www.google.com tcp
NL 37.1.207.31:80 tcp
NL 37.1.207.31:80 tcp

Files

/data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar

MD5 b30f63d751e58accea36d408ed680632
SHA1 3c8afa7e98a674c3be9e0f9ae37c0dd408b09e2c
SHA256 75ef5147279ddef2e7a9cb0c264b9055ef638904dfb93c3a5faef977fdd23326
SHA512 7fd4e755f5fb3619d301babcc0e7c854c51129bfc1db7319fe899398b4c5c62646b4687fb04bf0a3b0cf08d8bfce39e4ca2cbac3ecdbebfa4908dd3374475d13

/data/user/0/com.tvone.untoenynh/app_fogdqxpss/puqiklllaj.jar

MD5 cfe79f8009a3b37a758d886f089cd9a4
SHA1 36e2c2f751eace6a3f57fd9e2f3a39052d5ec2b1
SHA256 62b6663264b1bf3261faa8e7cd444f100ce73644522533a95135861f325f576f
SHA512 01259731514f79e22dc4e314935e5c0e1e8fa9861ff18ff42ad52aa20a64606aa48934310199b9a2e217ecfee2a9ad551f64909a929a4d591e90ea18423c4727