Analysis
-
max time kernel
19s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
01-06-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
8a84b0031572c49867cf9a4dd7147b2f_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
8a84b0031572c49867cf9a4dd7147b2f_JaffaCakes118.apk
-
Size
15.9MB
-
MD5
8a84b0031572c49867cf9a4dd7147b2f
-
SHA1
bb4e44221fb57b3633aa0bbe10df4a39974dcb0a
-
SHA256
e9ba2077fa3a5ea771cceea55bdaca9bef26250572bbc44b895471bb8bed1480
-
SHA512
c38b74669e8e1fb30bf398cf156f54431fed71fe47262075b653711511644d883bff17a1d854dd2f1b503bd6767efd6e155f37859af4239b9891a3ba772ef275
-
SSDEEP
393216:333Gzcwc2FKIe7kDZlHT2Fvlp6kXirzDrJ8YQYHR:3nGzcwc2M37kDZhUv76kSrt8YQYHR
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/mzw.jar 4329 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/mzw.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/oat/x86/mzw.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/mzw.jar 4295 com.bigfishgames.heshdgoogfree /data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/mzw.jar 4382 com.bigfishgames.heshdgoogfree:helper
Processes
-
com.bigfishgames.heshdgoogfree1⤵
- Loads dropped Dex/Jar
PID:4295 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/mzw.jar --output-vdex-fd=48 --oat-fd=49 --oat-location=/data/data/com.bigfishgames.heshdgoogfree/mzwres/sdk/oat/x86/mzw.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4329
-
-
com.bigfishgames.heshdgoogfree:helper1⤵
- Loads dropped Dex/Jar
PID:4382
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD580424ceb36bdfcf44dfc30cddc91b9ef
SHA1313f19adeab52dcc85933ffcd297532afd74769e
SHA256917860f9abb3455cb4857711469181da3379e29b7ee4cbe847a271bc9b4c4e06
SHA512ee28af9d14c25a13dc272eb40e2ce05e08749b908e66f5cecae78fc344d426b0ed3a16fd5a8d8530717ee4db76cb83514b72efe969df3457b3f45991a36311c7
-
Filesize
4.6MB
MD52876428d40896f2540b06b487ec34120
SHA1dbecb5a2a3030fbbe76f22bfd92054b67c68ed6f
SHA256d1491cbf20c6cdc48f2d1d226ceb00adc4701682ffed1005d0ba3aa3ff415d2f
SHA512cc24c32dcba4941d795b1b4ca3c316c261e8bced4a9e2fceaf16dfb22ed62fcfe364a18ef35dbb37f30a38a7c31f4df031b9e4badc99f4e7ba238a2cc1222471
-
Filesize
4.2MB
MD566b07e83586f6ec2444f513877da4665
SHA193d2efdda138aa02b985b36491b53f1d69f1166e
SHA2565313e4e6c408f4825036f8e6017de3602fee170871ef573a7bac77d4f4bf82c5
SHA5126deab236bbe384ea05a8a6f3bb747d779822bbf35b744d15f51e13e05e461a6fb42e41edf91eed1fa0ba021e0338a4bd74efbe2043b895e2352e8d3b9ccc0620
-
Filesize
6.2MB
MD51dd5072b6010a5afafacd6ac01e1bbe6
SHA17842f818d27b4531b63454f9f00b62908a793ec3
SHA256b608a102da216d4b35cfd433691a1d35176c3672f3530e3f54cc43b95ab7414e
SHA51229315a0ae0d561a0f74d2a6a878e9ccefdd9bae787ce29d0d5f2bc47ee760fea825ae6b0fcef8c0ba9af52eeafbc1271cc0e66c0e49102ec0330974869fc9e10