Malware Analysis Report

2024-07-28 14:36

Sample ID 240614-ap12js1dql
Target a74cdb89cdf6dea6b1743dd41adc70c7_JaffaCakes118
SHA256 507b111f1f7dc024dc8c9f7b8877395208e47ff7bba9a7a4e619d2a0270ac699
Tags
discovery impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

507b111f1f7dc024dc8c9f7b8877395208e47ff7bba9a7a4e619d2a0270ac699

Threat Level: Shows suspicious behavior

The file a74cdb89cdf6dea6b1743dd41adc70c7_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery impact persistence

Queries information about running processes on the device

Reads information about phone network operator.

Requests dangerous framework permissions

Queries information about active data network

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:24

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:24

Reported

2024-06-14 00:27

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

186s

Command Line

liulan.com.zdl.tml

Signatures

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

liulan.com.zdl.tml

liulan.com.zdl.tml:pushcore

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 cgi.connect.qq.com udp
HK 43.154.252.110:80 cgi.connect.qq.com tcp
HK 43.154.252.110:80 cgi.connect.qq.com tcp
CN 114.115.165.83:80 tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 120.46.131.222:19000 s.jpush.cn udp
HK 43.154.252.110:443 cgi.connect.qq.com tcp
HK 43.154.252.110:443 cgi.connect.qq.com tcp
US 1.1.1.1:53 sis.jpush.io udp
CN 124.71.170.130:19000 sis.jpush.io udp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 easytomessage.com udp
CN 121.36.205.81:19000 easytomessage.com udp
CN 114.115.165.83:80 tcp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
US 1.1.1.1:53 im64.jpush.cn udp
CN 124.70.211.119:7000 im64.jpush.cn tcp
CN 124.70.211.119:7003 im64.jpush.cn tcp
CN 124.70.211.119:7002 im64.jpush.cn tcp
CN 124.70.211.119:7005 im64.jpush.cn tcp
CN 124.70.211.119:7009 im64.jpush.cn tcp
CN 124.70.211.119:7008 im64.jpush.cn tcp
CN 124.70.211.119:7004 im64.jpush.cn tcp
CN 124.70.211.119:7006 im64.jpush.cn tcp
CN 124.70.211.119:7007 im64.jpush.cn tcp
CN 120.46.131.222:19000 easytomessage.com udp
CN 124.71.170.130:19000 easytomessage.com udp
CN 121.36.205.81:19000 easytomessage.com udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
CN 124.70.211.119:7003 im64.jpush.cn tcp
CN 124.70.211.119:7008 im64.jpush.cn tcp
CN 124.70.211.119:7005 im64.jpush.cn tcp
CN 124.70.211.119:7002 im64.jpush.cn tcp
CN 124.70.211.119:7000 im64.jpush.cn tcp
CN 124.70.211.119:7007 im64.jpush.cn tcp
CN 124.70.211.119:7004 im64.jpush.cn tcp
CN 124.70.211.119:7009 im64.jpush.cn tcp
CN 124.70.211.119:7006 im64.jpush.cn tcp
CN 120.46.131.222:19000 easytomessage.com udp
CN 124.71.170.130:19000 easytomessage.com udp
CN 121.36.205.81:19000 easytomessage.com udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
CN 124.70.211.119:7008 im64.jpush.cn tcp
CN 124.70.211.119:7005 im64.jpush.cn tcp

Files

/data/data/liulan.com.zdl.tml/cache/picasso-cache/journal.tmp

MD5 37e8e716e0e2f4a0b05cd9571d95b84d
SHA1 f8d068f6931707bddb8cd69f706f2224ad1fea3c
SHA256 7080cb592d5149c858b206d3fd0d5e3e7d601f120af00b2616bee928ee1291ca
SHA512 e62b850901835fdb73fa6224618422f721dd765861d42f6bc2dd013413e96bd910ac5313afd9b4f63da74beb12a15fac81b5157456c9caa3031862dab84423f6

/storage/emulated/0/data/.push_deviceid

MD5 2dd67af4a017d5a19b1bf9d46db4be1a
SHA1 5b3960bf7b69bbe0d42e7347b0cbf9a77b788c54
SHA256 c23804c0582da3b7dc0b2ad72d54171b4a7633bd6910f5bd274d07bd45547d38
SHA512 6dcbba0a60c6886246a8179231c9d6002c9f1304c3c5c03499b01f32a2971d023a719315ac8188ebe403552faea5a1c68fe823eff9f8065f59ced606897a41a2

/storage/emulated/0/data/.push_deviceid

MD5 99f3f9647a005567eeb08d3c5ba8dc72
SHA1 8e7553a178cee4df7e6f060ec76daa4ae132a8f8
SHA256 72521729a33720e90a128bcfd30e46b90a1249a1b836c8bb24328e09365a17ed
SHA512 b6dc4561150995fdb43e333d3d2f819b12a0f033d977b402e81c1515773fb64f6c688478e34eaab64c0812255ecadc3fe6804759fd6bbe20a7a552857a5ccbff

/data/data/liulan.com.zdl.tml/files/jpush_stat_history/active_user/nowrap/f4a7f255-2b5a-4793-9e5e-19f6bcfe1eab

MD5 54f7c0ddeb8ab4043101a6839a7b7b40
SHA1 fde05b8d50438ac394178fc162518a96232d7aea
SHA256 8c370a064c41055fe90efe9be5e3fe965ffe788d80d0e1a1e87aeaa262ca94ce
SHA512 8e2dbe1121be1b64bd8a98d4fdd685fc890c27c03fb333d813086f6e0f1dd7fc9fbbc88c39a9810f19f7f26446157a75313b66430d6410a572ca19179a11b964

/data/data/liulan.com.zdl.tml/files/com.tencent.open.config.json.1107463732

MD5 f526172de1566b34fdcea744710d9559
SHA1 000cb54d9a008a807a1c5a3fd2b2e7cb41e7939d
SHA256 8572be02b59f4d514000939ec04a9b4e2380c55265256b724a617d8d0f4c6940
SHA512 dc81f0fe345b18c96b1638c67b9ef4c5e60059dfc4a02f3c30a23645d4847abeef46cf467d044c42597115c48052ce0e8ea24328382114a544c5dfd039a95e7d

/data/data/liulan.com.zdl.tml/files/jpush_stat_cache.json

MD5 4f804ceb43aa64d767acd7ea9eb03736
SHA1 8fff7acc52245e999a868dfdc0af3f1ab8ecbf96
SHA256 9a736a4fc18cc1b990727848c27362a80b997001e29b3238ca018cb42efc8f20
SHA512 8c0d1f8b024c70f696c13a0deaec1c26f3da2ed482d25e5588389a386ad870d86fff168961039a52bf5bbdcb116185cf5873e2b07da73622f9a74a500733912f

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:24

Reported

2024-06-14 00:27

Platform

android-33-x64-arm64-20240611.1-en

Max time kernel

177s

Max time network

188s

Command Line

liulan.com.zdl.tml

Signatures

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

liulan.com.zdl.tml

liulan.com.zdl.tml:pushcore

Network

Country Destination Domain Proto
GB 172.217.16.228:443 udp
GB 172.217.16.228:443 udp
GB 216.58.212.196:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.202:443 udp
GB 142.250.187.202:443 tcp
US 1.1.1.1:53 cgi.connect.qq.com udp
CN 114.115.165.83:80 tcp
HK 43.154.252.110:80 cgi.connect.qq.com tcp
HK 43.154.252.110:80 cgi.connect.qq.com tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 1.94.137.180:19000 s.jpush.cn udp
HK 43.154.252.110:443 cgi.connect.qq.com tcp
HK 43.154.252.110:443 cgi.connect.qq.com tcp
US 1.1.1.1:53 sis.jpush.io udp
CN 124.71.159.41:19000 sis.jpush.io udp
US 1.1.1.1:53 easytomessage.com udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 114.115.165.83:80 tcp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
US 162.159.61.3:443 tcp
US 162.159.61.3:443 tcp
GB 172.217.169.67:443 tcp
US 162.159.61.3:443 udp
GB 172.217.169.67:443 udp
CN 117.121.49.100:19000 udp
GB 172.217.16.228:443 udp
US 1.1.1.1:53 im64.jpush.cn udp
CN 124.71.183.120:7009 im64.jpush.cn tcp
CN 124.71.183.120:7002 im64.jpush.cn tcp
CN 124.71.183.120:7005 im64.jpush.cn tcp
CN 124.71.183.120:7003 im64.jpush.cn tcp
CN 124.71.183.120:7008 im64.jpush.cn tcp
CN 124.71.183.120:7000 im64.jpush.cn tcp
CN 124.71.183.120:7004 im64.jpush.cn tcp
CN 124.71.183.120:7007 im64.jpush.cn tcp
CN 124.71.183.120:7006 im64.jpush.cn tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 123.60.31.166:19000 s.jpush.cn udp
US 1.1.1.1:53 sis.jpush.io udp
CN 121.36.205.81:19000 sis.jpush.io udp
CN 123.60.89.60:19000 easytomessage.com udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
GB 142.250.179.228:443 tcp
CN 117.121.49.100:19000 udp
CN 124.71.183.120:7008 im64.jpush.cn tcp
CN 124.71.183.120:7007 im64.jpush.cn tcp
CN 124.71.183.120:7004 im64.jpush.cn tcp
CN 124.71.183.120:7002 im64.jpush.cn tcp
CN 124.71.183.120:7005 im64.jpush.cn tcp
CN 124.71.183.120:7000 im64.jpush.cn tcp
CN 124.71.183.120:7006 im64.jpush.cn tcp
CN 124.71.183.120:7009 im64.jpush.cn tcp
CN 124.71.183.120:7003 im64.jpush.cn tcp
US 1.1.1.1:53 s.jpush.cn udp
CN 1.94.119.240:19000 s.jpush.cn udp
CN 121.36.205.81:19000 sis.jpush.io udp
CN 123.60.89.60:19000 s.jpush.cn udp
CN 123.196.118.23:19000 udp
CN 103.229.215.60:19000 udp
CN 117.121.49.100:19000 udp
CN 124.71.183.120:7002 im64.jpush.cn tcp

Files

/data/user/0/liulan.com.zdl.tml/cache/picasso-cache/journal.tmp

MD5 37e8e716e0e2f4a0b05cd9571d95b84d
SHA1 f8d068f6931707bddb8cd69f706f2224ad1fea3c
SHA256 7080cb592d5149c858b206d3fd0d5e3e7d601f120af00b2616bee928ee1291ca
SHA512 e62b850901835fdb73fa6224618422f721dd765861d42f6bc2dd013413e96bd910ac5313afd9b4f63da74beb12a15fac81b5157456c9caa3031862dab84423f6

/storage/emulated/0/data/.push_deviceid

MD5 dcfacc956876633168273fa8076a822a
SHA1 cdbc874070bb1e4ef9e370750afb48186e700612
SHA256 06849af704597888d4544a2124059986666e0e7a58601264b690799cfa23ffba
SHA512 b61cb814bc3feccb4656b83dd12e996ec939fb4a23c9131c4b358d781948fdb9a166caf19304f7c3532fed316e3806fed974b6978641b33d1e099664af5f28b8

/storage/emulated/0/data/.push_deviceid

MD5 f526172de1566b34fdcea744710d9559
SHA1 000cb54d9a008a807a1c5a3fd2b2e7cb41e7939d
SHA256 8572be02b59f4d514000939ec04a9b4e2380c55265256b724a617d8d0f4c6940
SHA512 dc81f0fe345b18c96b1638c67b9ef4c5e60059dfc4a02f3c30a23645d4847abeef46cf467d044c42597115c48052ce0e8ea24328382114a544c5dfd039a95e7d

/data/user/0/liulan.com.zdl.tml/files/jpush_stat_history_pushcore/normal/nowrap/3ceac616-3652-449d-a80e-b90da4d93c65

MD5 771c4c6b6971b31f2f9f9ef9b5737b28
SHA1 c92567d4024f2e43bada49772f270dbd734308aa
SHA256 16d9caae7d3c4d1039e65771fbeaafbd97b8093d9d861235f1ec27b8399cc9ad
SHA512 4ef309f950b65439815de450c4e4b1a5401734a0cea30b416f54874f4ff1e6e76b2c97c294c97751ddb462ee4528403f19c6690518b5469a9177e2e542f7b9b6

/data/user/0/liulan.com.zdl.tml/files/jpush_stat_cache.json

MD5 39522aaf349b850e02af8b952f3b8d08
SHA1 a1a0f173eb1b876ac3d450b957c6d4e995c49bd4
SHA256 04de5f9214b6d8525437615f408590662a25b8a2442696a994ccfcd66aea035b
SHA512 5bf130bd6190244b1772573b5389b37c9da80bea191dfd876f89b26b6689a6881d4a759bbbfa4fa0e7503bb50fbd8853ffc865d955ad9925d7814e2fa8cbc8a7