Analysis
-
max time kernel
7s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
18-06-2024 13:25
Static task
static1
Behavioral task
behavioral1
Sample
bc2aaf24c37a7b2b3ce3873bf503f519_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bc2aaf24c37a7b2b3ce3873bf503f519_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
bc2aaf24c37a7b2b3ce3873bf503f519_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
bc2aaf24c37a7b2b3ce3873bf503f519_JaffaCakes118.apk
-
Size
1.7MB
-
MD5
bc2aaf24c37a7b2b3ce3873bf503f519
-
SHA1
f3ca0b30b79999a07e2b5f744bf808455f66520d
-
SHA256
2703f9dad65ff832293601209c0a5b448052f05641a3c64fe6dbf0febe5a5f1a
-
SHA512
fdf8c9baad4d0e963ec839353207b126000563e0ed67896a0afd29c5dc79a1fa1ddee2f746295f754ec850e474f4b7ac496028d66d30b81906dd78ed8ba3bd36
-
SSDEEP
24576:OeG1e859RO2QkhAtzhrFZGIkKYs+i0tpmjgYmvQCUKngvybxfImBKWJxDAFjQGP/:OeH8zRbhAtbD9+lq6vfOsxHBKWXm0K3
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yanyan.cputemp/files/__pasys_remote_banner.jar --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.yanyan.cputemp/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&com.yanyan.cputempioc pid process /data/user/0/com.yanyan.cputemp/files/__pasys_remote_banner.jar 4347 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yanyan.cputemp/files/__pasys_remote_banner.jar --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.yanyan.cputemp/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.yanyan.cputemp/files/__pasys_remote_banner.jar 4318 com.yanyan.cputemp -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.yanyan.cputempdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.yanyan.cputemp -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.yanyan.cputempdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.yanyan.cputemp -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.yanyan.cputemp -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.yanyan.cputempdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yanyan.cputemp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yanyan.cputemp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.yanyan.cputemp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.yanyan.cputemp -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process File opened for read /proc/cpuinfo com.yanyan.cputemp -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.yanyan.cputempdescription ioc process File opened for read /proc/meminfo com.yanyan.cputemp
Processes
-
com.yanyan.cputemp1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4318 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yanyan.cputemp/files/__pasys_remote_banner.jar --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.yanyan.cputemp/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4347
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
791B
MD5830ae28df7aa22292d6009eb85b0a766
SHA1e610e892f9a3ce25357937189145d2a664a579ea
SHA256e4ee4f305923a0214d04fba68dc3974aee2b190b44c119b059b6b26c1f9e1845
SHA512b5a63174bc8af64ecfa904bd6dbc1e63b7957e70835968a48495a7f101a9a493c3fde0ed106da430dbf7055295376223a55d6a9555bf35263a6c329fcb0d86f3
-
Filesize
25B
MD52d805b13f2f28dc3ca9bbcc000f49bb5
SHA19eac165b4d81258fd3967cde5cc53b53b1dabcb1
SHA256c8a6624f390568f0ddcb9841336aec6a564460fdaf6624e562b32935b8956f19
SHA5125db8c57bab36bcf9db698c1dce70318cbffc156dd1d1c1e09e5b7ba60aff07b598ebbf26c4bd8a2b03bd6e59ef2dde2d944a22a8d8a19ecc8378e83afb7c83b0
-
Filesize
295KB
MD5289aa52188b4a1eb9a3a5904b0638ada
SHA13efe010f8832bc5ee7df88152e01ef1f446663c4
SHA256947be2e29c43127ccaa6ab05b2600405cebd5aef985204a4cf2e17ecf7cfaa91
SHA51234078ccf3fc42c63f338bb9f62eb139d953ad9e0e5fd813465d9f4d37f708fc20d7309897919cdf6be37acbda2669fd6d32ff4a233279e2cd6e2a0ba62cdc47d
-
Filesize
417KB
MD5981c6cf9b7df281081e05c808cf0afd5
SHA148aabea85a9693f461f87e1bdb9f8e76a8b45c1b
SHA256639cf990e6246c0418adf545481ca1549a3ac1b443bb3ad3f5a3552400e41f0e
SHA512b6e668c33021b64adaa304a4e085a2c5c88c16c99e811a4c768534fd67cd6cc380e125e960de511c3abc33c7b842be1441a7dd48aff83c2928d62ebaf65f6adc
-
Filesize
417KB
MD596d208e818748da0a0510994de5be961
SHA18f093544c3ce04ef1dc323730d2937f889c911c6
SHA2569fab83f42fe2573d80524e4b91caffaee37f2ca37f56f6a97a2c626fb7927215
SHA51255a2b0c3a86ed751f31f96774aadebcf9068a4c3b828f0e1f4e30f0a5acd7a66ef14df7361ad2d9cccfe8f560db8e8cb2c67d9a459a75d24fbf762528f32bbf8
-
Filesize
89B
MD586a80106dc142fdd41c9ab946761cd2d
SHA117c33ad464b42da35f824297fa5eb2892fcffc60
SHA256f2451ba0b742dacc9ae7c38395b93182343575ca8e02fe8a6a3cbaf0094d1de9
SHA512dc55bc19fc8baa4ac7dd09a6f1fcd2d5ef6dae4c9cc09621637bf732975f4d491c22acbdfcf281656f99126f19ded06318b9a1dcd3d93e51692ee812323ca862