Malware Analysis Report

2024-07-28 14:18

Sample ID 240613-m1cjjswapd
Target a52cf9fc6805fb265edc9a441ca48117_JaffaCakes118
SHA256 c3ebfed0112a03438157cafa0f513613b81657006753162c6edcb02f02b316b5
Tags
banker discovery impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

c3ebfed0112a03438157cafa0f513613b81657006753162c6edcb02f02b316b5

Threat Level: Shows suspicious behavior

The file a52cf9fc6805fb265edc9a441ca48117_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker discovery impact persistence

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about active data network

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 10:55

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 10:55

Reported

2024-06-13 10:58

Platform

android-x86-arm-20240611.1-en

Max time kernel

4s

Max time network

130s

Command Line

com.baidu.zhizhu

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.baidu.zhizhu

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 server.yichuad.com udp
US 1.1.1.1:53 mjoy.91.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp

Files

/storage/emulated/0/Download/yccp/time.dat

MD5 ecb06f96271142ea06af5b8f94dd7363
SHA1 1244054dc2fa77aeaffe4cba984e8544b2753cd2
SHA256 210c36cdfbd379f60b8396b384137cf19ac1c85c41c67c49120424dcdc6c5231
SHA512 e8512ca5b884a4997be2b2b3b0437393155d27c79311d0e78384817158e9f7ab78b48fd427fda7e5c1fd37c1155eb10a96ba824b26eae15ece14e2f2cf3de76d

/data/data/com.baidu.zhizhu/databases/yc_cpdownloads-journal

MD5 0aaf9c1ff03f3439326f0add93367288
SHA1 06211032c36a1c6414e87a6100691a46a15ac124
SHA256 fc2c0f1a4257345c7878c2a5dad77f1bc92c506e88a559697a22871043d47611
SHA512 86d0b918ea1a58dc8d56939788ee081afbb6eadbed2928d13a8467cbe4d3547df3264f4228c54354b853f3e5e40e66416c719fae67415fcee4240c3daac623a0

/data/data/com.baidu.zhizhu/databases/yc_cpdownloads

MD5 18293462a9f784a00624d4ce9c5ac516
SHA1 1da000aea427977a02972b5b893afa7c7ba7ef07
SHA256 c657e1977d848c10ff9dffd925e599e7fb9346dde23c27cb2ca4fc7076fad756
SHA512 a413005d98f65e4b104391bc1d62e0b27128b62f177b0278039c4d87077767b30af97641b15e5bb2ffa17ed9db196e82e3f80f7bd0767d63122ba6876d206d0e

/data/data/com.baidu.zhizhu/databases/yc_cpdownloads-shm

MD5 cf845a781c107ec1346e849c9dd1b7e8
SHA1 b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA256 18619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA512 4802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612

/data/data/com.baidu.zhizhu/databases/yc_cpdownloads-wal

MD5 d8f4c01702a41d009a738119091fc656
SHA1 307afd1e21d213691f481ab11787913846089938
SHA256 7d3ed65dad75f8d8b298a48d9adb58c7e9a06272226fb75d8c733a592af10f34
SHA512 81fa03407dac5469a5be1a3089ade06872d8ae4fcc604b8bb5236a68a44efe820cc62adf72e03ce585d36a1626a06ccce2a708335a1c21e66dacade3896e2cd4

/storage/emulated/0/Download/ycpu/clst.dat

MD5 9241294c5de9529a6092344dba83e594
SHA1 5489413898ddb86425a0b4877ffb4f2a1a2de134
SHA256 03393afba95124c0dac465d8c1317be6cd53d561f4190d17d2a020e7423bbc23
SHA512 cd9282f9d3ae3e45a81865cf17b72e8568f4ecebf8e998784a4631ebf1bb5ae8dd97e5e6f199af3767314572f87549c8629f7237c158cd4097ae41f832399e57

/storage/emulated/0/Android/data/code/YI.DAT

MD5 d84c298e56b5b57a712a12a4db6fb985
SHA1 862c74703723a575752d2914577c171e91705c4a
SHA256 4a7348e9ff679caa0e5f3f5f3a2fc3c821f64364d8d049b28fc8f6a49dd78960
SHA512 1bfa126444ee82d7fa9b0e84e2e18c0c825ae2dc1dbf6f204f2ea20815b3c0055087c17102dc89ed5327e721d31298185382b38ba645699cd561b2dbaa0db94e

/data/data/com.baidu.zhizhu/files/umeng_it.cache

MD5 b06fac27295027f5c4f130283cb326fd
SHA1 caa8e345a977701cedf572f90ae65ba278439ddf
SHA256 bb0415b1ceef811f3744049c64da3d9cd2edb0655232413c3270af76f600d876
SHA512 5811bae30bd35f5f2ea2561a66b58f7d4dbdbbccaa9e64dd715a226b220f5498b49b463b2222f04aa38c017ef148b2c0e25f429ea6ea8d344e4b30ec58e09233

/storage/emulated/0/.dianjin/com.baidu.zhizhu/properties/d1f79aa0b0da3a72f530e67e2cf8d2ce.properties

MD5 467a442783fdb3f9a3e5e6b554717371
SHA1 09e4f260d70d0e22f6e18df54679ca64162ada57
SHA256 067ef11ac2d7e472094d9de6665965e5185de1fe57d3ef16008d8375ab720044
SHA512 ca555368fcd9f68e1bf5f336461a6bc65b3363767eb615cc115e6cd0c28ae255b10a513af1d127a9dad4d67fdb63e2a5533556836af575a078d52a489bf253a2

/storage/emulated/0/.dianjin/com.baidu.zhizhu/properties/history

MD5 0d210bfb2a0e1f1b4c082a6a0f79de07
SHA1 bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256 988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512 536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1

/data/data/com.baidu.zhizhu/files/.imprint

MD5 c150a885aa835b19849b93349b5b9177
SHA1 7c37430c058323fda13c126df12381cd8ef2c263
SHA256 c0434d358e86be794f57df585325b47fe4e691163747fb3b1a003daf90f574e4
SHA512 ae502508413af0a48d7730f07a4fc29399022a4937d0200653083b7a31777554cefcb86714851d47804196987c1c0ef510425b1ba4eda71ed42a2cfa657e11b8

/data/data/com.baidu.zhizhu/files/umeng_it.cache

MD5 c6a74ebade0c6958b527c99f156da1bb
SHA1 51a3dec7f30e54dcbaa4da7df8a16351fae72624
SHA256 1c0acccfce97ec105421af10dfd4a87b9c88ca8218a61f5a8243dc181534e940
SHA512 bfc97ce1f9fcf0a3cd1c5e1a256d73627538fa581b8110dfae37e9b0fa00bcd92576a52070329ab358659b6cfa21f5dacefef9e8f6a3620b3913f76cc36c3e66

/data/data/com.baidu.zhizhu/files/mobclick_agent_cached_com.baidu.zhizhu265

MD5 58f659def106dd692d2691f5b31dbd29
SHA1 923bca96b462ecb05ded491841f28ff4187650dd
SHA256 c6996fce61dda70a43253f193ced26fdafc284391954965d248503a7019f48a1
SHA512 dd2b158690a86aeac405369b9b4697e908ec62281ef1ae54e64c11cb88132de48ef1ae73a58e5a82cb7383cad2e99c9143b8115f906d9c9e0f1ef66851a8e0b4