Analysis
-
max time kernel
160s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
29-05-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
462e131e3b1b3e72f475374496bd6d0067fb271b78d25302f4798764e961e529.apk
Resource
android-x86-arm-20240514-en
General
-
Target
462e131e3b1b3e72f475374496bd6d0067fb271b78d25302f4798764e961e529.apk
-
Size
2.2MB
-
MD5
e143e7e9c6518566b164d17779aeaced
-
SHA1
eb5c102409f45d8e3e0c137f5d3f21aed5cc2032
-
SHA256
462e131e3b1b3e72f475374496bd6d0067fb271b78d25302f4798764e961e529
-
SHA512
de05f5a053a3b1d445b8e28790a222e27c2cb48e6affdc5a353a76657c0abe5362f8862f5553d226257cf5d369ec3e6dfe4ac02f69b3695a74f5b6ea068bba36
-
SSDEEP
49152:3bXariYd8Zkxqm3VSd63y8ZipwkHkB1seN0ELOcnDRoG6MnPhbe:LXaOfZkB3VSdKiikuOcnDClMo
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText kcbemzsjob.pcqswfdcpw.xhnxkqw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId kcbemzsjob.pcqswfdcpw.xhnxkqw -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction kcbemzsjob.pcqswfdcpw.xhnxkqw -
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwpid process 4209 kcbemzsjob.pcqswfdcpw.xhnxkqw -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS kcbemzsjob.pcqswfdcpw.xhnxkqw -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqw/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/oat/x86/uiBBLIE.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json 4209 kcbemzsjob.pcqswfdcpw.xhnxkqw /data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json 4233 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/oat/x86/uiBBLIE.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json 4209 kcbemzsjob.pcqswfdcpw.xhnxkqw -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground kcbemzsjob.pcqswfdcpw.xhnxkqw -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.app.IActivityManager.registerReceiver kcbemzsjob.pcqswfdcpw.xhnxkqw -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS kcbemzsjob.pcqswfdcpw.xhnxkqw -
Acquires the wake lock 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock kcbemzsjob.pcqswfdcpw.xhnxkqw -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS kcbemzsjob.pcqswfdcpw.xhnxkqw -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework service call android.app.job.IJobScheduler.schedule kcbemzsjob.pcqswfdcpw.xhnxkqw -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
kcbemzsjob.pcqswfdcpw.xhnxkqwdescription ioc process Framework API call android.hardware.SensorManager.registerListener kcbemzsjob.pcqswfdcpw.xhnxkqw
Processes
-
kcbemzsjob.pcqswfdcpw.xhnxkqw1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4209 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/uiBBLIE.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/kcbemzsjob.pcqswfdcpw.xhnxkqw/app_DynamicOptDex/oat/x86/uiBBLIE.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4233
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471B
MD521aade0420a2df93b4dba7b7ba7e7b18
SHA10d1aa4873ce9ff77b2e37bb834e5c4dc1354399d
SHA25643df61255ae37022179ae8f45ca4949a4b3c6f2ff452014bace951b0fe204386
SHA5122349697bee7e220897ad2e201db04890771fa9aa9f56e1de9c5dfb377d79f693775c362d1f1b4ab20fa289b31ba2e60dbd59be790c4b1505f4d7dd4668471656
-
Filesize
1.4MB
MD541f6439a763bf43aa4c74943d7fd745f
SHA1ff02de7a300cb01782158cd9aba7d32795927f16
SHA2563309cc667c5b49e829999302661109a3d47db1537c188f55d0d6ce26d7406142
SHA51247a5eed43fdf86b65f6dadbbd1d8d4cb377b44df6d1f61f11d1d0976279d5cba453e980fb10c8664815cd9f2e1c295722d20f213359c0ab2b911370ab098b020
-
Filesize
1.4MB
MD574ba1ad4d3b3f1eea3f632a866928a9c
SHA1c6bc9771b7954278d821dfc007d166bc8ae0dc6b
SHA256229b305917067d34eef2cfec6f126627c89998d85393597d87fe926d26943f6e
SHA512593e60351622445aa4e56f26844069f5d8b942f5869dbaec88744cda8dade5fef87886c895888cc5c9dfc19f596f03d58856d62816a914a5f173efc529f30bb7
-
Filesize
1.4MB
MD55ce1939db78329d67c511b4f04e3a78b
SHA10ef8e4bfa758ecdef4643597f9dc7e0f9454cc0e
SHA2563205b40deae9793dbec8b36f4a6d57f08f7a3b81693f1cd3196947367eea505c
SHA5128cf1c1bffb8674883a1421d7796fe6172d284cd8932c277dc5fa54fbe1e94957416cca3cc47dc4c6db3666f5858f61408c0afb7875ba999e8ca1aa55c13389a6