Analysis
-
max time kernel
179s -
max time network
171s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
31-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
85a241e9b28d7c602503a9276f413662_JaffaCakes118.apk
-
Size
687KB
-
MD5
85a241e9b28d7c602503a9276f413662
-
SHA1
efc2064ac32d963e326ff0641ddacb58fab72f1a
-
SHA256
96f6f725178d648dd98d16d7e9095457b42bfe7b15419c0e470dc312b697890d
-
SHA512
55c3ecc637cb2f5ad29d2d07b06262b63e7341dbd150d1232a903501ea319ddb59492e5ab45b283c80deef98eefbe51e616ffc19e5cfe35c41baeff1474acd5e
-
SSDEEP
12288:t3AxEHw9xbIW0T+NZQMjQzdQ2bqX3i7Q5CvvkclrtssdU:t3uE35T+QMjQzdAXElrtHdU
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/oat/x86/htbqtqphlo.odex --compiler-filter=quicken --class-loader-context=&com.dyxnjbcw.ckrchucretioc pid process /data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar 4373 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/oat/x86/htbqtqphlo.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar 4281 com.dyxnjbcw.ckrchucret -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dyxnjbcw.ckrchucret -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process URI accessed for read content://com.android.contacts/contacts com.dyxnjbcw.ckrchucret -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process URI accessed for read content://sms/inbox com.dyxnjbcw.ckrchucret -
Tries to add a device administrator. 2 TTPs 1 IoCs
-
Acquires the wake lock 1 IoCs
Processes:
com.dyxnjbcw.ckrchucretdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.dyxnjbcw.ckrchucret -
Reads information about phone network operator. 1 TTPs
Processes
-
com.dyxnjbcw.ckrchucret1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Reads the contacts stored on the device.
- Reads the content of SMS inbox messages.
- Tries to add a device administrator.
- Acquires the wake lock
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/oat/x86/htbqtqphlo.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jarFilesize
78KB
MD5718583315524e4a1e3382647d755dcff
SHA1f0f23d239e019cf3fc7dbe0c088732c114ae2fc1
SHA256a2249042923e68c71766babe513cdf56b5ea1d9dc98ecc53d94edd094d531462
SHA5125d4cc55cdffa59b2818314d8f6cf49257b9996ef41026236f3e2957656528ce61d3fac4ab4769d7ba50c65642d5d32a444cdb0cca32d60d0dfebfb9f3d1c5f26
-
/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jarFilesize
179KB
MD5c68626c1255c1eee24099bc813b8b9bf
SHA1ed4bb060afad9d118ade433d733fa33a7d15def8
SHA25612c94913e48ece102979120fdbd939046fc53f5b0a0ba1ec82639edb8ca35857
SHA512d39401d8dafa163347ed1a8ed720262ef78bf4e74c67a3203adb3bd4874c2c253ce2aadde4309ea90597beaac65f1bd0195db7584f9dfd46d6b36dad55e5fad3
-
/data/user/0/com.dyxnjbcw.ckrchucret/app_ytxlwoke/htbqtqphlo.jarFilesize
179KB
MD58811b67f19cc17b23b91aefec75ea611
SHA1107ba3f56c102557a6c58b3eabec318ed3c7fe28
SHA256f3876a99c5b66df9a3dbd4cf1be2ec1ddde6532a232d2ef67a35777c00e0c33a
SHA5128e45b1235cd60fc35586fde71870e635e12e4493ee70b058e551df2309d31ff72b39a91d6b5ccea8b6732ab34f81bb459d011efac44cfc0ee4ddb46abb4680ad