Analysis
-
max time kernel
86s -
max time network
177s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
18-06-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
bac22516ce33d6f124bc19dfa5981c99_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
bac22516ce33d6f124bc19dfa5981c99_JaffaCakes118.apk
-
Size
1.7MB
-
MD5
bac22516ce33d6f124bc19dfa5981c99
-
SHA1
e85904bc5789ae8ee5ab7df3d7c22d4365fdda0d
-
SHA256
d8d604d61d5838a511f176d55ab826ed69691b62c0715bb1e0da2487b32c867f
-
SHA512
082cb9d8c60d8cedbd4cca3419b3f35ff88b530b4a0de5655c782b721ec9694d5cdab243702173bb8efed64f38d090468f19aa3afd3c05481b00983835ebc0f0
-
SSDEEP
24576:J0DR/V+CDj54mWYOyX+unSvIreETiI5EGMG10rPCAUTmY0xTcKYwqI2GsKI:KhDumbOyXrRACAhTl5qUs3
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xmh.lrulwv/files/hul/oXspvAuHLI.jar 4322 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/files/hul/oXspvAuHLI.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.xmh.lrulwv/files/hul/oat/x86/oXspvAuHLI.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xmh.lrulwv/files/hul/oXspvAuHLI.jar 4285 com.xmh.lrulwv /data/user/0/com.xmh.lrulwv/files/Pdd.apk 4498 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/files/Pdd.apk --output-vdex-fd=60 --oat-fd=65 --oat-location=/data/user/0/com.xmh.lrulwv/files/oat/x86/Pdd.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xmh.lrulwv/files/Pdd.apk 4285 com.xmh.lrulwv /data/user/0/com.xmh.lrulwv/app_dex/utopay.jar 4533 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/app_dex/utopay.jar --output-vdex-fd=75 --oat-fd=76 --oat-location=/data/user/0/com.xmh.lrulwv/app_dex/oat/x86/utopay.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xmh.lrulwv/app_dex/utopay.jar 4285 com.xmh.lrulwv /data/user/0/com.xmh.lrulwv/files/yl_plugin.apk 4285 com.xmh.lrulwv -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.xmh.lrulwv -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.xmh.lrulwv -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.xmh.lrulwv -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xmh.lrulwv -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xmh.lrulwv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xmh.lrulwv -
Requests dangerous framework permissions 17 IoCs
description ioc Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Required to be able to access the camera device. android.permission.CAMERA Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xmh.lrulwv -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.xmh.lrulwv -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.xmh.lrulwv
Processes
-
com.xmh.lrulwv1⤵
- Loads dropped Dex/Jar
- Reads the content of SMS inbox messages.
- Reads the content of the SMS messages.
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks memory information
PID:4285 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/files/hul/oXspvAuHLI.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.xmh.lrulwv/files/hul/oat/x86/oXspvAuHLI.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4322
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/files/Pdd.apk --output-vdex-fd=60 --oat-fd=65 --oat-location=/data/user/0/com.xmh.lrulwv/files/oat/x86/Pdd.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4498
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xmh.lrulwv/app_dex/utopay.jar --output-vdex-fd=75 --oat-fd=76 --oat-location=/data/user/0/com.xmh.lrulwv/app_dex/oat/x86/utopay.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4533
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5eb6089c1acfa9f12535e533aebee845e
SHA1165e39ee07dcd9ed00fc2dc1ff466bc1d6b813c9
SHA256b825cde84e3dddfc147c71265d2259c422d51a7e56d1dcdba1321e3119b1df07
SHA5125b1bc26bcbcf05fc331865fb4dd572b673a52650d68ab4d9b028ea15219e0d93c1ec17996953436801913388d78e25c67ea33aa93544d65e96a799eb06cc70f5
-
Filesize
512B
MD5ce19c8ca3fb05d3101c72f8f9701a221
SHA12d82e571afd222b5147d72d135a0e941ede79d21
SHA256f7086fbfaa543bcf4f3520c52901b8e061280c7b9de9e1521df95ebcce9bbb4b
SHA51249c083438be40912d5f6f45887ef0c046930244231aa2752e0b4ca1c1db34cf80714072dd54d0680b451030361951435ab5c7e0225d3638e249377dca41b0d61
-
Filesize
16KB
MD57ae8f4e330c839ee434116c107a430f5
SHA159c905363a4d92eb20f5098c62ad68d5d90e2fc8
SHA2565d47eb6d5b6d46b55695a3fffae4c02847b1ce0625b0f437373c0ca85dab3b57
SHA51246f8d9482614e9fcb1ad18209c1c1761e29ceb4e6e3b8748a10128a6330205380ff1a38840897cd65b657cecfe7e16d0c2550d333f49bbd42facd6d7449646cb
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5188bc3daa3ce4307118113edd39a288e
SHA1ead2e55e4654e6536c0c1527d09734e0d3e1d298
SHA25636171e04ce11afe2229225508c21030efa0f50ce896fa8d1b9e5140c4678c375
SHA5122ada8c377a8643ab1d37db081bcebcdc8caeec551522a8e0ee90c5f8f59b3da2d10bc69a14900552ad72e3418405a31195a79c8b881f7ed6296b54edf6ea462e
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
20KB
MD53a1d9401208a87fe54716489b1372f52
SHA18706b11b0ab784b398ff99d9f8680d2474d5434f
SHA256989992c648230d49b54042bf0cd2e927d0cd8a7eb15f083ba4975e3879e9feec
SHA512dfdc4dcaf3491a5f39ea7f58a35e145870c0b6a1f3bac07cd79d98868a8d367ddafd264d77a76c6cfa6db0719d65078c70e34ce2a3f852ccc73873be1b7fbc85
-
Filesize
99KB
MD5e8fbf92c750dbd6fb316be82a6b7b7ae
SHA12a6ae9568698807cacc8cf4349556446c996b136
SHA2562a3cb93d0ca14a1d0b0820c2a26df502a461fb2546ef4587524087c130553f10
SHA5127848191878b5b8ba2d5020c7be953e70ccc4d392d29e400a65a57cd3731604933125de1d81b3732d251b3450fd4766a814ccd01f3975beda2499a9ba585a26e0
-
Filesize
772KB
MD517f60ef31c4d83c1fb2ceb07691ebb33
SHA14815d474430df71fb3c79c1425fac6b4e9b14346
SHA2569437aa2c495215d9262d2035f779335559b732419455db909a815b8ac6014427
SHA512e939878e64c1d335ef94291b33098419be21cdfb16a6112911cce0bcb1265aa79791ff3909d385ab48cbc45fb28fab5609db71b606390092fb58728fc3c221cd
-
Filesize
319B
MD51af9a2a67c26edb207dcef2e6a06a43f
SHA1af3203be5fae40da238765ac0bcfad896547e460
SHA2564c019d6e9675d72a8ea1e21fa8d82e747e1dee3b39139da183a8630d037cbbdd
SHA5123103292c5592bfc784085735bf84600ae7fc98a4b60b3ccde7d08f3791a94a120644d8ffa0e81fd9a57da82254d8357ca48deb6a64747d16e4ab82f71d694c03
-
Filesize
221B
MD5ff9229f8e7c92d44d48e25206d43b021
SHA1be3d75050c16c5b7484652ba292fdd6510f205d3
SHA25677fc3599be409f7e73e643de843c0ebcfa20662964c498fc59e245c7f5e003a2
SHA512be7b3aa8d670a2873c6b7bfd4ca93121fd2450723cbbc36d9d06d152fafa3ce90451f0a60ab56bc96bccb81cf5aae0167b404073db14dc17b9513ac73d455c58
-
Filesize
58KB
MD55a4c666b43ee7f2b6995aaf3527e4a4d
SHA1b205bcb022797f3b16635db139c7524c0c388adc
SHA25605eb3e1ca331b8c6a1f60f92abb2bddbac54a7b2c229ac07bf26c756297fe72a
SHA512c84fceddbf9928110fc3b85e0989b9cedd06383007ff99dea5a25096d8f892ab52d30ed9b52b72211449041f1274ead85bb42929ec269b58b6b0e616a8545e17
-
Filesize
67KB
MD53b8bb9a8679ac8c24e8d179fc5bae999
SHA1e6ea7a1095524087f481ba04321c4cb6fd2426f3
SHA25683c996c0d067b5f516897480f427dfffdcfb49ab7654dac9b805376bbd49e1db
SHA512abf1cbed7a8cf4a29d7a32a83f15aa0a6c9e2be8484c2dd8d9bf16a76e337b17b9c05efa0773598806b3d3da4fe3a9217b583abb9aaf5e3dc054dc77b10cae63
-
Filesize
67KB
MD55220524411d0bacd600da60814d1ee9f
SHA1fef7210ff44e757328bc0ff7aae7bb2191cbf634
SHA2566286a800597b845785eb664710253ebd20771737dddd5b80067e0e9d37c804b2
SHA512b2d8af5019c176d682634747d83320e609fb6122ef850f4069a0c78c2415d242087099cf60ecb03039a9ab71902a4e3b22e9cf144de89e506991fb93280f6a5f
-
Filesize
201KB
MD5b91783059376e2bebfd7c24802289350
SHA19e0f855404908f993a3beb146e7a4e83789674bd
SHA25646245d65e1d96038918f77ed8412bcde6a72b513c94a72369a751251f568e73c
SHA512c50af3f34a519fdb34aa9be70128c55c57df169f8112887f17f9dece581a15cd9b6702939ee4f77370bb33a5d2fe449610c42e699008d4233344d406c3563f30
-
Filesize
201KB
MD5a4237ef36f11c2db307f6d9701da0062
SHA15d11008a4b9275034db8904e538f7115a429ef0d
SHA25632f697f7444c79efe23be55fdcdab52c8e6f5cd43474cd1735602675feb5639e
SHA5126921b3cbb4e6a062eb9408c06e46e6d6cd7554f6e485b8f6275d8df3b7a8d23b26220c0cb979d3fe919fb6622d5d49160769b0567eebe61488cc4c7708f3b34d
-
Filesize
1.8MB
MD547b903db4755bded81796df10598727f
SHA1a8467d4305c6d583bc2bce002d5d7aa0c20b9138
SHA2562ea43ee22dd851a9ea2560342697d4bb49be0f7231f61f1cd335b6c5102e310e
SHA512d4ff62156840e12d225bfa616599e69e845c84c16088b39327bd3a0e24dc53b569c05983d5df06fa3bebc024078dd59dfb511bbecbf0fa546365931e73d48fc3
-
Filesize
1.8MB
MD5fe81101dd31e4c9cb4a417a2dceffd30
SHA15486003b6dd78151f69443240b922a72e717bfee
SHA2567838a807176b78303461c359eec997b6decc1a28926e5803f46c407fceda1db5
SHA5125d3dc98a6abeb0b02e061e8972d420a6becf4ac7696dc3ef0ce46d7c9114079ecd3a284af2d88d0244aa3a6df15b4809239e920328240f8fd67083ff6a27b53e
-
Filesize
123KB
MD5918890b3fc5a3dc184a57d027ead24da
SHA1c638f375f49bc4731b633bdc001aeeadf9462039
SHA25657d03ac2189851d5069515da6997e12ca307c145aa21679da001477df5f81836
SHA512fd9bfe41ce4041dc8c7db17df2a2164a24ea96372c212399c499f94d1fb7d95d430b8a7eb86041b9b2db88dfca0cf39e53cba2dad1e346aebed29e4ca5deb2ef