Malware Analysis Report

2024-09-09 12:58

Sample ID 240614-njs1msydre
Target a96c8cc329b40c964320628af9625f45_JaffaCakes118
SHA256 28894963a755df97c6f2312fcec27aeef357a61ab706849b47114c275043ee60
Tags
collection discovery evasion persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

28894963a755df97c6f2312fcec27aeef357a61ab706849b47114c275043ee60

Threat Level: Shows suspicious behavior

The file a96c8cc329b40c964320628af9625f45_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection discovery evasion persistence

Requests cell location

Queries information about the current nearby Wi-Fi networks

Reads information about phone network operator.

Requests dangerous framework permissions

Queries information about active data network

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 11:26

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 11:25

Reported

2024-06-14 11:29

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

181s

Command Line

com.my114.my114wanrui6763wap

Signatures

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.my114.my114wanrui6763wap

com.my114.my114wanrui6763wap:remote

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 m.veryitk.com udp
HK 168.206.163.202:80 m.veryitk.com tcp
HK 168.206.163.202:80 m.veryitk.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 loc.map.baidu.com udp
HK 103.235.46.246:80 loc.map.baidu.com tcp
HK 103.235.46.246:80 loc.map.baidu.com tcp
US 1.1.1.1:53 php.114my.com.cn udp
CN 116.204.35.69:80 php.114my.com.cn tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

/storage/emulated/0/baidu/tempdata/con.dat

MD5 8d80bc8ea90e9cac010d3ddf97bda5f5
SHA1 f063bc0d356e6ba9ab1eb9a851131ffbefd8fa07
SHA256 f52db31332534833414abd5e870f78c810b8ebbe5b134bbf599506beecfd1b93
SHA512 9ea732dd572a9a4ba91b70891972230a09576687ca1bc19e62d5a98b5b84e0f2ae11985108008bc9fbccf357219b8bd3dbf146bb70752f618f70dc5d0c46a7c7

/storage/emulated/0/baidu/tempdata/con.dat

MD5 7c884f9d3757a8264ce59f2230c366c4
SHA1 e79025953e8b32021b293c53a450eac6f15a0cdb
SHA256 9e179d3f710dd4c815fdd541fd1eb7aa61e7fbf8f57538bd5cc91fafd4da4a07
SHA512 f2074e91f075fc184fb4df616d8b9f173cef8b2e4e9b446f36d72846b20a965ef6ff9656938ac6e6ea6b6a597605e4f499cfe0e2987d9c6b424b286249d88761

/storage/emulated/0/baidu/tempdata/ls.db-journal

MD5 0b1c579c5649e729d59838430b7543d0
SHA1 fd171aaac40cb2c731f2cbfb25ccfe2b21b0f400
SHA256 5f7baa5776b35523be9fe9573bf072a96f26cf055649aa14f7144a402abbb8b1
SHA512 ba91a65d0b6f87d9e131e723f460f23371bf53316009421f86141ed013aa0841c1653dd7b66f64e6ac744fcab6cf8ec5c0f2a5f1d819b2b316f965bef2d289fa

/storage/emulated/0/baidu/tempdata/ls.db

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/storage/emulated/0/baidu/tempdata/ls.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/storage/emulated/0/baidu/tempdata/ls.db-wal

MD5 b16372f66f8f1f57c9490dde10f29e95
SHA1 04314e78ac1accd94083233a08b890ce4c15d251
SHA256 c22e2fa313a049ff89008160a42fcf0df8af80687350d46d40c6720272be792b
SHA512 1665d1a2ca6bebc441d862bf6a048c62108e04bf4f5830a29c533dcb862cc87c1bdcb5227e584ec5134781d58f8d749abdfc06f3978cecc47ad2cc7ec9cebafe