Malware Analysis Report

2024-07-28 11:45

Sample ID 240614-exvlysyeqn
Target a7fdb7fa2bd0d367fddf68dd1a4ea851_JaffaCakes118
SHA256 27bdf1ac5d04a255228d9a2bd1f13fa2150c16ad61eaebe767dddbae14902697
Tags
collection credential_access discovery impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

27bdf1ac5d04a255228d9a2bd1f13fa2150c16ad61eaebe767dddbae14902697

Threat Level: Shows suspicious behavior

The file a7fdb7fa2bd0d367fddf68dd1a4ea851_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection credential_access discovery impact persistence

Obtains sensitive information copied to the device clipboard

Reads information about phone network operator.

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries information about active data network

Queries the unique device ID (IMEI, MEID, IMSI)

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 04:19

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 04:19

Reported

2024-06-14 04:22

Platform

android-x64-arm64-20240611.1-en

Max time kernel

47s

Max time network

132s

Command Line

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 alog.umeng.com udp
SG 47.246.109.108:80 alog.umeng.com tcp
US 1.1.1.1:53 receive.client.c-launcher.com udp
SG 54.179.170.13:80 receive.client.c-launcher.com tcp
US 1.1.1.1:53 api.c-launcher.com udp
SG 3.0.217.185:80 api.c-launcher.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp

Files

/data/user/0/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/uuid.md

MD5 1bed19e748e65eee7ebd188f29918259
SHA1 e8e7f21b2fe1af1e411d5d1de29f1b1795073392
SHA256 73031b2f918bc24f79057f91f488fc7828c00dbf00461be58be836f076be64fb
SHA512 70b3f5a77b9dc091aadc6815c1d8080ef7b89c750ff2e32ee7697df5db69718e04b8141e78075d4182b729deb244171d0db552895fa0e790865e6c17be33c33e

/data/user/0/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/.imprint

MD5 eff47b865e6e5285db52ccfde307b5a2
SHA1 17a545b741e3b1c7df335d5008dfd42f42feb96c
SHA256 135214e65d815976206e701f5d82943f76fb1e638c952ca1004c49d892ba7ffe
SHA512 79de65869d2cd86c8f9ea51cd138a14b8bc0668620dc23d6668582d12557f539e133399e64f1e9276b8ac28a75c6f4b4650b21cfe079eabf4f997bea5691d236

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 04:19

Reported

2024-06-14 04:22

Platform

android-x86-arm-20240611.1-en

Max time kernel

19s

Max time network

150s

Command Line

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Signatures

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
US 1.1.1.1:53 receive.client.c-launcher.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 api.c-launcher.com udp
SG 3.0.217.185:80 api.c-launcher.com tcp
SG 54.251.178.82:80 receive.client.c-launcher.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp

Files

/data/data/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/uuid.md

MD5 5d3f058ad2357a1eb0aff83197be2d5c
SHA1 e7f1262ad454357f13afdb344768c9fe1060f791
SHA256 3136c417424734fd690f3536171628726536c20702ba27e590284f6b8d5db5a3
SHA512 217abbe7afcda9327a7b8cb3edfba6617d81fb02e9ee5698b6fe04993f7938bc49e8232cd2b8728d56dfd6818020c749549482828dc9b5b375460dd21f149a2b

/data/data/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/.imprint

MD5 91effa895f6bfe818c95ff1a8be0ce7d
SHA1 2b78fce405baa1c67f1c722403eb9bd8665c4274
SHA256 f47118d2a29a5972b8790420f6a1844907f4adf0eb91f76fe2d1d6c9fc1e6cd0
SHA512 85146defa7c8d30b9cd89a4362c3a0118efc78895afa46a3cc2f8b136bbd09bbb8a9341ee9de59b575dd8d70511b390ebadf7dc0aeee71c049c5d93e8645de98

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 04:19

Reported

2024-06-14 04:22

Platform

android-x64-20240611.1-en

Max time kernel

49s

Max time network

150s

Command Line

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.cyou.cma.clauncher.theme.v545afea835114130622a77cd

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 alog.umeng.com udp
US 1.1.1.1:53 receive.client.c-launcher.com udp
US 1.1.1.1:53 api.c-launcher.com udp
SG 54.251.178.82:80 receive.client.c-launcher.com tcp
SG 3.0.217.185:80 api.c-launcher.com tcp
SG 47.246.109.108:80 alog.umeng.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
GB 142.250.178.10:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.178.14:443 tcp
GB 216.58.201.98:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.213.14:443 tcp

Files

/data/data/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/uuid.md

MD5 c678ed8ca6be188b69e93baddecd7d70
SHA1 accd8e9f07f7d87997d01a5f5d78ae341241046d
SHA256 a6dc0943b2558e2601993b44cf23e9e3e5b01753d5d77ced1b00a467eef65f79
SHA512 8812be74c7ffc8309afed30530c11f7588363b078e79c202f2d2312714fc340ab23d85078f1d6262eda0530f0ad30543a1e23b9bd1ec874484f14bde2081a80e

/data/data/com.cyou.cma.clauncher.theme.v545afea835114130622a77cd/files/.imprint

MD5 a4aab5b41ebd4fe748bb3d7d9304e876
SHA1 5965252807122eab96e656e2d762ff07f4314ff1
SHA256 b0daf219d1e23c6db0ff5744cff1e8d380bb3c85c2a539af9c71576cf559378c
SHA512 5d1274434e6ae89c6f0722dcb65fe37cd2575ac2c21dab37ecd60bfce36c1e8cc962ce82f733277eeaa4997937acada521c7318fe9f9ace0d26bd38e0f54d5a4