Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
189s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
14/06/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
a7bad3dc83bc22a8bb43bfdc1941322d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a7bad3dc83bc22a8bb43bfdc1941322d_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
bdpwxpayplugin.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
bdpwxpayplugin.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
bdpwxpayplugin.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral6
Sample
res.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral7
Sample
res.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral8
Sample
res.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
a7bad3dc83bc22a8bb43bfdc1941322d_JaffaCakes118.apk
-
Size
22.9MB
-
MD5
a7bad3dc83bc22a8bb43bfdc1941322d
-
SHA1
cfaf7a2e36cf531cac6fb6c4f144ad7d955f0a1c
-
SHA256
f52df789ecd95881dac24787d88fd28f7d4888b2b25ddf7a789bd307f50d67b3
-
SHA512
16277fb73251d17e9f61d9b79c08ea3fb2a3d99ca521da0790836de622cb238f278015e7e759e3ff024cb17e2f1ce09c6656ff62383e7daebdf17da08b2e40c7
-
SSDEEP
393216:YXw+JH6nWo56QJwNQ2+DmrNpxs439ujXbfPjgjI6wupr1G1d20TMItceu:YjJan16UwCKrNUe9Ibf8jMupru20TMIe
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.winnergame.bwysz_new:lbmain Framework service call android.app.IActivityManager.getRunningAppProcesses com.winnergame.bwysz_new Framework service call android.app.IActivityManager.getRunningAppProcesses com.winnergame.bwysz_new:bdservice_v1 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.winnergame.bwysz_new -
Queries information about active data network 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.winnergame.bwysz_new Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.winnergame.bwysz_new:bdservice_v1 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.winnergame.bwysz_new -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.winnergame.bwysz_new Framework service call android.app.IActivityManager.registerReceiver com.winnergame.bwysz_new:bdservice_v1 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 2 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.winnergame.bwysz_new:bdservice_v1 Framework API call javax.crypto.Cipher.doFinal com.winnergame.bwysz_new
Processes
-
com.winnergame.bwysz_new:lbmain1⤵
- Queries information about running processes on the device
PID:4268
-
com.winnergame.bwysz_new1⤵
- Queries information about running processes on the device
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4307
-
com.winnergame.bwysz_new:bdservice_v11⤵
- Queries information about running processes on the device
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4366
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5c0894b15cfcfa1316c6210de788150a1
SHA1ab52a419d789d86e76abdee30bcedb6dc313324b
SHA2563bcebd359777555dc2e0ceaefabf259e862204357696b5c550d9757ea254539d
SHA512aef57e4fc67f614ad5379812679531ebf1310bd6841ab0f50e5f33c774f69492bdc77a9d41378db30ef45ae57160123945a504b7bb5347220cccba14a11f0aa1
-
Filesize
32KB
MD5376084d9d2f276aaf504d61e94d7fd04
SHA1bdf565ee51029cbd8e40e898b5a06ffd4dd2b232
SHA25624d991ed3d220655c4982a934ce81aff0717d054404052575c7a20bf2baa23cc
SHA51215ac3bf9d333744bb388694efed6b20884298691a9ae232a5fd3f3c36d52c69f3de440d65933d00bdc2491947c4f18daf5b074057f6fd7e920ed53528499f547
-
Filesize
40KB
MD5a89e2b2267d2471372e7ea636ac335c1
SHA1b7fac50225b4a72de520d18c9a2f4f5c42607097
SHA25682c04aed70c69a4591938c232f69fe070b33d587a7004704712c957420b87c32
SHA512f1ed46f1aa5430f23b38ad179a19e48ab0fbf6f5aff4c61689d2dd9ca7b456c10bf48ba24d05efffd990875d042d05fc626223237560b6eb941fae57ca71b99d
-
Filesize
100KB
MD5ca60862cc321aee3b3a449af1e7febde
SHA1d944162541ff916058ef51c7ab06cdfded3daf84
SHA256ea0b0c6e97c4cc9cae09d3707e8f5b713948458aa4616c2fb66ec97a9ffe074e
SHA51220860541f467696f9fb116d17cfa836ce9cfeee0dc058551a2227f90286a5e8cc4eb48559d320c701b2952eea7c3a3731f2241b53d56662cfced6b62c96fbd56
-
Filesize
16KB
MD5e1b797afd18bb178623eaa48104ac5c8
SHA1518923cc95bd9d44304fa26f69b951eeba07adb5
SHA25633efb8a857446d559080241837688c8c87a54f89bf3c4a4dd38425097c90b2fa
SHA512cc980249da812012faa7401eb21712caaf332527ddaac3ad03c109694b565ad5e9208273f285e941dc01b678d6d1ac512e860a548ed4c66ef0bdb555e1406753
-
Filesize
24KB
MD514333af0a37109b6d1d87d1b48a8ffa6
SHA1c81b8f6cd2b9f7e704e47aadf24953affbe63823
SHA256a94cea847fb14e10d51b1c0b8f3d50d09d67e2a3a4663812b4062ab0e742fe7e
SHA512a14e18a64f93fa07b4462fad9a8869c908cc762a6578eac46172bd9dbaa6700dc306379d85e32466d668db1c1b071d98c5e528524ace445f2f5756f790b5782d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5a9e2261d717fe9cce9108c138822ccbe
SHA16661c9c98fcb40a3a23a6cddc283bda618d9fa05
SHA25692aee60e31bb8db3db6e7ff6c2eda1bff13fbd09d93577c693edd4a43fcb9846
SHA512de3aa0ba232ed871de402f13a12894a8f9aad004b6eeb46e9f034e07f9763097fd087fe10e1c77fb9d441b4b464e505c7f186fcb391e2380944384d25725871c
-
Filesize
512B
MD5f03b76d3c0345422a12fc955df7028ee
SHA14a7c48dffadea4179e41a88d8c596f58bf17294a
SHA2569974dc45dacf776e10ff6b2dcef59ce78f6b684fc563c03ee50e9d579f9afa67
SHA512e13605ee320bf15ad607192f4dea4b711506a8cfd39fb3bc743127bf96fa95d11e8a2056747927363fdf84f4156fcccaddb1ff82091afb5d8d14d183b2dbab34
-
Filesize
160B
MD5cf16d8f7050622e40c30a40e0f03a7b4
SHA159b66b35646a806e7842971c9b60605bed4c9ead
SHA256cdb6258c06e7b11aece25e7d2c2588258e196ee9446402cabc1f7cc1045525d9
SHA5124dfdce5e2a5e471cca2998ce16634dc8e42c83a3da7d1c08d41004b6817c2e6c605c5619c8a0efa1c10f2dde5baf7a996f29cf0fd01ac3f24540d02c3efe0331
-
Filesize
56KB
MD5700dafee4970159fb47ba1b0bf2e85bd
SHA107c024edda43ede3749416f224671a6413bf2f45
SHA256f5c6f52da72c882a6093af8149439d972d3b9bd7df6a33aaeb53561a0850bd04
SHA5122ec665e4e9e8ce8d2193ed09cc72f8582e470eef65dbaddf533dcf09136239b7698c641b87cd8cd341365a94d9669a54ff465d916de4df293fc7e990bf35717a