Malware Analysis Report

2024-09-09 17:15

Sample ID 240613-3lnahavhre
Target a7222ddea426bde1d057313a18f67da9_JaffaCakes118
SHA256 45f6268643bc4bec78d8dde7378c768a6c7f74b5de99997d32139a01a0d8f5de
Tags
discovery persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

45f6268643bc4bec78d8dde7378c768a6c7f74b5de99997d32139a01a0d8f5de

Threat Level: Shows suspicious behavior

The file a7222ddea426bde1d057313a18f67da9_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence

Requests dangerous framework permissions

Queries information about active data network

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:36

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to write the user's calendar data. android.permission.WRITE_CALENDAR N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 23:36

Reported

2024-06-13 23:39

Platform

android-x64-20240611.1-en

Max time kernel

3s

Max time network

131s

Command Line

com.ksc.ad.plugin

Signatures

N/A

Processes

com.ksc.ad.plugin

Network

Country Destination Domain Proto
GB 142.250.200.35:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.213.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 142.250.200.14:443 tcp
GB 172.217.169.66:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.204.78:443 tcp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-13 23:36

Reported

2024-06-13 23:39

Platform

android-x64-arm64-20240611.1-en

Max time kernel

3s

Max time network

132s

Command Line

com.ksc.ad.plugin

Signatures

N/A

Processes

com.ksc.ad.plugin

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.234:443 tcp
GB 216.58.212.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 216.58.212.196:443 tcp
GB 216.58.212.196:443 tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:36

Reported

2024-06-13 23:39

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

137s

Command Line

com.lzj.shanyigzsqsj

Signatures

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.lzj.shanyigzsqsj

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 apiha.mobgi.com udp
US 1.1.1.1:53 statha.mobgi.com udp
CN 111.230.161.172:443 apiha.mobgi.com tcp
US 1.1.1.1:53 android-api.ccplay.com.cn udp
CN 111.230.189.29:443 statha.mobgi.com tcp
CN 203.107.44.252:80 android-api.ccplay.com.cn tcp
CN 203.107.44.252:80 android-api.ccplay.com.cn tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
CN 111.230.160.108:443 apiha.mobgi.com tcp
CN 111.230.161.64:443 statha.mobgi.com tcp

Files

/storage/emulated/0/Android/data/com.lzj.shanyigzsqsj/files/tbslog/tbslog.txt

MD5 26f7c8d8b6c9e8c1111224a65e6abf08
SHA1 cddfe0360198909750bcb117488374f259991f7f
SHA256 e42357561f4dd6a91dc7511f2d323a73b5cfb176a20a5ada575aa2fc2d40b5d9
SHA512 705e48ccea93e70fab2c89595d35c9c54a8d584c4021fe2b579ade437c8bce66bb583cab380bbe0e6931c7f11529eccdc8c7a035303a198c379078be997a0491

/storage/emulated/0/Android/data/com.lzj.shanyigzsqsj/files/localStorage/shanyi3000opg

MD5 cc23a5af73453c27c71b49531c5d8900
SHA1 c7f276cb3c755040703109a164b93c50707ebe1f
SHA256 a22f3a3eedf177e0490498f6b5e8b469102d3363f1f824a1e95599f8d7df268f
SHA512 618d90063303a25cdf7d1aad4ccf499dc4c13f41210de7fa47178acc5497528647252ca258af8d19edf05e56fc6099a4ec017376783ba0c179d7e13f979d7bdd

/storage/emulated/0/Android/data/com.lzj.shanyigzsqsj/files/localStorage/FAA0AA0A-2EAC-7BD1-0A5A-80D3392EFCDBsystemInfo

MD5 2fcd85c249f1adb5012ca9ed30046a3e
SHA1 67053ecd352eae6fcdc1721ccbef08e436fa4d7e
SHA256 36ea06329c7f353be7dacb1982e612d9d805f61b888663aec94721483e0b59a3
SHA512 d4960549cde65660db1932107e666ea32440cd5c7e01fe36c598a09d7c313770dea88860c369afe9aaa103d4145da3e7520389d59a400f3dd55b66d44e21031e

/storage/emulated/0/Android/data/com.lzj.shanyigzsqsj/files/localStorage/FAA0AA0A-2EAC-7BD1-0A5A-80D3392EFCDBpayInfo

MD5 b5a26d96f1597a247122283e3f2c122e
SHA1 d24f88d8285fad16dc4dda6f5bf9bc642aea130b
SHA256 177af43285c16a08e80858327d9ee0bfee95e2bcd4155f35e257d6681716712e
SHA512 ffa3f2c0a9269e3310914c4fc4d5d1a0111b2338e7d6a985915f7d9bfbcbe23db116ae741d31d3d15c4af37a0ceddc952a7a1148b1b2722cf836c9d8eca855d7

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 23:36

Reported

2024-06-13 23:36

Platform

android-x86-arm-20240611.1-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 23:36

Reported

2024-06-13 23:39

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

132s

Command Line

com.ksc.ad.plugin

Signatures

N/A

Processes

com.ksc.ad.plugin

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

N/A