Malware Analysis Report

2024-09-09 17:12

Sample ID 240613-hd943ssalj
Target a43e13b4ee7cebd1189d8e77d1f7bd24_JaffaCakes118
SHA256 68bd8a10ce568be7fbd89a379bd902f1ae91f75c1eafe940544717fddfb29ad4
Tags
banker discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

68bd8a10ce568be7fbd89a379bd902f1ae91f75c1eafe940544717fddfb29ad4

Threat Level: Shows suspicious behavior

The file a43e13b4ee7cebd1189d8e77d1f7bd24_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker discovery

Queries information about the current nearby Wi-Fi networks

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Reads information about phone network operator.

Requests dangerous framework permissions

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about active data network

Queries information about the current Wi-Fi connection

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 06:38

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 06:38

Reported

2024-06-13 06:41

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

140s

Command Line

com.alipay.android.app

Signatures

N/A

Processes

com.alipay.android.app

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.180.14:443 android.apis.google.com tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 06:38

Reported

2024-06-13 06:41

Platform

android-x86-arm-20240611.1-en

Max time kernel

64s

Max time network

131s

Command Line

com.xuehua.beautychess

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.xuehua.beautychess

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ipay.iapppay.com udp
US 1.1.1.1:53 oc.umeng.com udp
CN 59.82.23.79:80 oc.umeng.com tcp
KR 192.186.12.154:8082 ipay.iapppay.com tcp
KR 192.186.12.154:8082 ipay.iapppay.com tcp
KR 192.186.12.154:8082 ipay.iapppay.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 oc.umeng.co udp
CN 223.109.148.176:80 alog.umeng.com tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.46:443 android.apis.google.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/data/com.xuehua.beautychess/files/app_flag

MD5 55262ac0ea28e278700585751b154768
SHA1 07d4a14caefb49cb12fb676da7a3e9d5e22a289d
SHA256 9a607d286f47a46807287b40d923100e5d4ecdc72e9a4b3dc96888dad2275972
SHA512 de7e55820cef9c6602c366e1df5d2ce15695750aca17dec310e41e6007bd51d465102c9697ac26608f3f6c6fb11bd618354651dc31d078be7379142641812b12

/data/data/com.xuehua.beautychess/files/mobclick_agent_cached_com.xuehua.beautychess

MD5 3d42a33a4c89c8bfabcc10439e1add10
SHA1 2fd645a24be1fb20b21d20b61dd0a9151d9d82a0
SHA256 e9ed7d24efc2d7b8078f142a02d1af07b6a5bb56343fdda5fc9b428974acbe32
SHA512 68ab16811906d34f851e886bbfd82217a2507a5820aa54607640501c97ede981265a1733a334254434e031090db3399a53438d403fbee8d00d8f03d925ed87b7

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 06:38

Reported

2024-06-13 06:41

Platform

android-x86-arm-20240611.1-en

Max time kernel

3s

Max time network

169s

Command Line

com.tenpay.android.service

Signatures

N/A

Processes

com.tenpay.android.service

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp

Files

N/A