Malware Analysis Report

2025-01-19 07:58

Sample ID 240610-rgft3sydld
Target 9aedaa2e6f115e628a1b79f694b58b7b_JaffaCakes118
SHA256 938970b64e5d6bc572348a5ae870452f72142246db40596de311f666c7b8bcfe
Tags
discovery persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

938970b64e5d6bc572348a5ae870452f72142246db40596de311f666c7b8bcfe

Threat Level: Shows suspicious behavior

The file 9aedaa2e6f115e628a1b79f694b58b7b_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence

Queries information about running processes on the device

Requests dangerous framework permissions

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-10 14:09

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x64-arm64-20240603-en

Max time kernel

3s

Max time network

133s

Command Line

com.qihoo360.saoma

Signatures

N/A

Processes

com.qihoo360.saoma

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:13

Platform

android-x86-arm-20240603-en

Max time kernel

7s

Max time network

178s

Command Line

com.qihoo.haosou

Signatures

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.qihoo.haosou

chmod 755 /data/user/0/com.qihoo.haosou/app_MyLibs/watcher

/system/bin/ndk_translation_program_runner_binfmt_misc /data/user/0/com.qihoo.haosou/app_MyLibs/watcher /data/user/0/com.qihoo.haosou/app_MyLibs/watcher /data/user/0/com.qihoo.haosou http://info.so.com/?product=Msearchuninstall&src=soapp&userid=1e18fbffea292e6cee5e2ff2ebd0e2d0&version_name=2.0.2.2010&code_version=300&configuration=-1&channel=baixin_3&phone_type=Pixel2&network_type=LTE&ram=2.0&screen=320*592&ut=1718028603 http://s.360.cn/mso_app/uni.htm?userid=1e18fbffea292e6cee5e2ff2ebd0e2d0&version_name=2.0.2.2010&code_version=300&configuration=-1&channel=baixin_3&phone_type=Pixel2&network_type=LTE&ram=2.0&screen=320*592&ut=1718028603 0 /storage/emulated/0/360search/watcher/work com.google.android.setupwizard com.google.android.setupwizard.util.WebDialogActivity

sh -c ps

ps

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 216.58.201.110:443 tcp
GB 142.250.187.194:443 tcp

Files

/data/data/com.qihoo.haosou/app_MyLibs/watcher

MD5 cae1c35b1470a81350c709d8c616ea9f
SHA1 b18e5167a762d24622e0d0af86f0faaf4d2a433c
SHA256 144df6b0c51dbabba0a4428e396f8c8e0348d1831f99f5d65f97bbb4b5a10aee
SHA512 a4945e01959e1628da5094978ccf18803e0f7bc7d10637fc14fdea11e42001313ff5e541ba495aab72aca0a21db5ce57b9faa703c2f60ee6fc04e8a6af692468

/storage/emulated/0/360search/watcher/work/watcher.pid

MD5 b035d6563a2adac9f822940c145263ce
SHA1 d476dba25e14e22aa801a0aa1be0c81806d5602b
SHA256 0d4a81d212f55a147b93d76d087644f05c9ccd15d7e39bcad9197cae707be224
SHA512 22b55ad1ca2c035349a1b2daed7efe058dad05ad77cfcd537323213c567395070f2f35ecbc214215c7848a64bf410d9d2ef809af1e4bd543c1f4e83ee99ab756

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x86-arm-20240603-en

Max time kernel

2s

Max time network

132s

Command Line

cn.qihoo.reader

Signatures

N/A

Processes

cn.qihoo.reader

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x64-20240603-en

Max time kernel

3s

Max time network

132s

Command Line

cn.qihoo.reader

Signatures

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Processes

cn.qihoo.reader

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.66:443 tcp
GB 142.250.187.228:443 tcp
GB 142.250.187.228:443 tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x64-arm64-20240603-en

Max time kernel

3s

Max time network

133s

Command Line

cn.qihoo.reader

Signatures

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Processes

cn.qihoo.reader

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x86-arm-20240603-en

Max time kernel

3s

Max time network

132s

Command Line

com.qihoo360.saoma

Signatures

N/A

Processes

com.qihoo360.saoma

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-10 14:09

Reported

2024-06-10 14:12

Platform

android-x64-20240603-en

Max time kernel

3s

Max time network

189s

Command Line

com.qihoo360.saoma

Signatures

N/A

Processes

com.qihoo360.saoma

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
GB 172.217.169.14:443 tcp
GB 142.250.200.34:443 tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
GB 172.217.169.46:443 tcp

Files

N/A