Analysis
-
max time kernel
55s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
17-08-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
a1eb2adc5bdf473a3a7634347db93cf1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
General
-
Target
a1eb2adc5bdf473a3a7634347db93cf1_JaffaCakes118.apk
-
Size
1.6MB
-
MD5
a1eb2adc5bdf473a3a7634347db93cf1
-
SHA1
c843049a9bca53432217a93437e20987a726bade
-
SHA256
7d6139211468db9e57b2638af316de50c696f2dbe3f2e4db243fbae4b63e0cde
-
SHA512
a63a6c7b59b0a800c037581e34eb001a3ddb399d78c3e0b38f55ba8148a7181e5161d31d26d029d322da2ec28b554a5958cc7f947e6d6cbee356fe1a656e7d90
-
SSDEEP
24576:vWJRmtMRnguiei22mhJyaOMoruQDBDWTnfrK3I5C0DR/V+CDjORXMWp4poK1FQc:OyWguie2mhE8JfrK3I5fhDSRXt6Yc
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.ssy.bcmxir -
Loads dropped Dex/Jar 1 TTPs 8 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ssy.bcmxir/files/cua/EkAzynxx.jar 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/cua/EkAzynxx.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.ssy.bcmxir/files/cua/oat/x86/EkAzynxx.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ssy.bcmxir/files/cua/EkAzynxx.jar 4253 com.ssy.bcmxir /data/user/0/com.ssy.bcmxir/files/Pdd.apk 4362 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/Pdd.apk --output-vdex-fd=65 --oat-fd=70 --oat-location=/data/user/0/com.ssy.bcmxir/files/oat/x86/Pdd.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ssy.bcmxir/files/Pdd.apk 4253 com.ssy.bcmxir /data/user/0/com.ssy.bcmxir/app_dex/utopay.jar 4407 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/app_dex/utopay.jar --output-vdex-fd=76 --oat-fd=77 --oat-location=/data/user/0/com.ssy.bcmxir/app_dex/oat/x86/utopay.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ssy.bcmxir/app_dex/utopay.jar 4253 com.ssy.bcmxir /data/user/0/com.ssy.bcmxir/files/yl_plugin.apk 4512 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/yl_plugin.apk --output-vdex-fd=77 --oat-fd=78 --oat-location=/data/user/0/com.ssy.bcmxir/files/oat/x86/yl_plugin.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ssy.bcmxir/files/yl_plugin.apk 4253 com.ssy.bcmxir -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/inbox com.ssy.bcmxir -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.ssy.bcmxir -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.ssy.bcmxir -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ssy.bcmxir -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ssy.bcmxir -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ssy.bcmxir -
Requests dangerous framework permissions 17 IoCs
description ioc Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Required to be able to access the camera device. android.permission.CAMERA Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ssy.bcmxir -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ssy.bcmxir -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ssy.bcmxir
Processes
-
com.ssy.bcmxir1⤵
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Reads the content of SMS inbox messages.
- Reads the content of the SMS messages.
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks memory information
PID:4253 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/cua/EkAzynxx.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.ssy.bcmxir/files/cua/oat/x86/EkAzynxx.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/Pdd.apk --output-vdex-fd=65 --oat-fd=70 --oat-location=/data/user/0/com.ssy.bcmxir/files/oat/x86/Pdd.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4362
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/app_dex/utopay.jar --output-vdex-fd=76 --oat-fd=77 --oat-location=/data/user/0/com.ssy.bcmxir/app_dex/oat/x86/utopay.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4407
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ssy.bcmxir/files/yl_plugin.apk --output-vdex-fd=77 --oat-fd=78 --oat-location=/data/user/0/com.ssy.bcmxir/files/oat/x86/yl_plugin.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4512
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5eb6089c1acfa9f12535e533aebee845e
SHA1165e39ee07dcd9ed00fc2dc1ff466bc1d6b813c9
SHA256b825cde84e3dddfc147c71265d2259c422d51a7e56d1dcdba1321e3119b1df07
SHA5125b1bc26bcbcf05fc331865fb4dd572b673a52650d68ab4d9b028ea15219e0d93c1ec17996953436801913388d78e25c67ea33aa93544d65e96a799eb06cc70f5
-
Filesize
512B
MD5f25658d19fdd04b37bd75e49368e910b
SHA1de5d6f1cc79d7c14e2149d4e2e171337093eb499
SHA25639079f8016a6718881d04833fce7effa9272e51bb88514f05f94746c5ab5b19e
SHA5129361d501bbf2672cee232b7500348c4bbb9ad57d50b64782e09246ff72921ea151f52de69339fab201cce5549df20b4c1536f1d92053ba9a245ed6c0633e653e
-
Filesize
16KB
MD51fccfad4588eadcd664f6d0028f9e099
SHA1b380ddb0ac2e7784889eb905d1f0651ee160ba74
SHA256674d45d88798005bb503d4ae8b220d652ef2abf64ac86402f7aad5da26e90e51
SHA5127d31a275617fddb530d188c2c9d18896f576e614c7b261df2f007e4efa67b29ba13c72b645badd61e9d159db8b55d0495174e4fa6e66e174368f15836f8ea692
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5d9e42d846b6f397dce3fafaab0b10cdf
SHA18df1195e0c258edc0673796b9e8a01c349445dfb
SHA256ae8165a9afa24aba00a05674fe0623329a5b93dae1c848f16a0e3c6b52e3b08f
SHA5121b4e34920572ca94a1ebd4be13b3001babeffb82d6594801dcf879b9aefe0000c63d32ea83b332cb25a4d9731f4c9124f778cb4d03b93a1adb33c44535f764f5
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
20KB
MD5194fb854fac054dc5df2deb21313a332
SHA16473ab59a9460b718b48b00d786203e35516a188
SHA256ca97088e3f1958ca4bca5b2644a2b60c8ab5069a2b9b50e885dc312d54aadef2
SHA512b89748420ec4f60ae7851db9b33d07f90a3b676ceb2adf78c0dde0d59a6850d55c8525b168b2a25bf4c7c60b6cebbc41a833b3573f201a56f8f506655967bf9b
-
Filesize
99KB
MD5e8fbf92c750dbd6fb316be82a6b7b7ae
SHA12a6ae9568698807cacc8cf4349556446c996b136
SHA2562a3cb93d0ca14a1d0b0820c2a26df502a461fb2546ef4587524087c130553f10
SHA5127848191878b5b8ba2d5020c7be953e70ccc4d392d29e400a65a57cd3731604933125de1d81b3732d251b3450fd4766a814ccd01f3975beda2499a9ba585a26e0
-
Filesize
776KB
MD5f54a7f7a59ab857dee352a903996abac
SHA1591e84b609c60301550e5638bc9b6808f9696a56
SHA25685e3224280e8276ec0816933bee7397715b11f6a7a23f5a311bdc49842ebeb76
SHA51210e895170860dbe0c9a25e2a3ca652cba2f375b7941e7f15a34d1ee2ca1278eefa77b2ad489eb6a879cb4669986552f3d6621735984d47ba4abde0bcd45017d5
-
Filesize
315B
MD5e4f50105aacda139398a607b7ff09908
SHA1c952fd9d3fabfbb5031bf1b31aee9ea45451e38c
SHA256b34731757cbf62e47922c003118edaabb61b1f3ecb456d891dab2b8e6eac19b1
SHA512bad5e5d437b9ec236b0171e5d4a622ea30b2fc09e260104def874a1c17d625ffe8704f89a9cd3076ed6362e54833c44119e9ebfb27baea37591574e57501223e
-
Filesize
221B
MD5ff9229f8e7c92d44d48e25206d43b021
SHA1be3d75050c16c5b7484652ba292fdd6510f205d3
SHA25677fc3599be409f7e73e643de843c0ebcfa20662964c498fc59e245c7f5e003a2
SHA512be7b3aa8d670a2873c6b7bfd4ca93121fd2450723cbbc36d9d06d152fafa3ce90451f0a60ab56bc96bccb81cf5aae0167b404073db14dc17b9513ac73d455c58
-
Filesize
58KB
MD55a4c666b43ee7f2b6995aaf3527e4a4d
SHA1b205bcb022797f3b16635db139c7524c0c388adc
SHA25605eb3e1ca331b8c6a1f60f92abb2bddbac54a7b2c229ac07bf26c756297fe72a
SHA512c84fceddbf9928110fc3b85e0989b9cedd06383007ff99dea5a25096d8f892ab52d30ed9b52b72211449041f1274ead85bb42929ec269b58b6b0e616a8545e17
-
Filesize
67KB
MD53b8bb9a8679ac8c24e8d179fc5bae999
SHA1e6ea7a1095524087f481ba04321c4cb6fd2426f3
SHA25683c996c0d067b5f516897480f427dfffdcfb49ab7654dac9b805376bbd49e1db
SHA512abf1cbed7a8cf4a29d7a32a83f15aa0a6c9e2be8484c2dd8d9bf16a76e337b17b9c05efa0773598806b3d3da4fe3a9217b583abb9aaf5e3dc054dc77b10cae63
-
Filesize
67KB
MD55220524411d0bacd600da60814d1ee9f
SHA1fef7210ff44e757328bc0ff7aae7bb2191cbf634
SHA2566286a800597b845785eb664710253ebd20771737dddd5b80067e0e9d37c804b2
SHA512b2d8af5019c176d682634747d83320e609fb6122ef850f4069a0c78c2415d242087099cf60ecb03039a9ab71902a4e3b22e9cf144de89e506991fb93280f6a5f
-
Filesize
201KB
MD5b91783059376e2bebfd7c24802289350
SHA19e0f855404908f993a3beb146e7a4e83789674bd
SHA25646245d65e1d96038918f77ed8412bcde6a72b513c94a72369a751251f568e73c
SHA512c50af3f34a519fdb34aa9be70128c55c57df169f8112887f17f9dece581a15cd9b6702939ee4f77370bb33a5d2fe449610c42e699008d4233344d406c3563f30
-
Filesize
201KB
MD5a4237ef36f11c2db307f6d9701da0062
SHA15d11008a4b9275034db8904e538f7115a429ef0d
SHA25632f697f7444c79efe23be55fdcdab52c8e6f5cd43474cd1735602675feb5639e
SHA5126921b3cbb4e6a062eb9408c06e46e6d6cd7554f6e485b8f6275d8df3b7a8d23b26220c0cb979d3fe919fb6622d5d49160769b0567eebe61488cc4c7708f3b34d
-
Filesize
1.8MB
MD5c72e7678f08ec9b12a6c8b022dec2fe8
SHA1f28169b45c516c159cd669e55b02233a3b3dc948
SHA256513b0c0da6ad0388addb00e36877f9f11787ff895c63cdb1738255ffba9455e1
SHA5124b728901ac22eed516e9c0bd28d8846d3683701f0302d2ff2535df564b45b21f0b64538ab0934b12d8a86d0d4ef01afa61e72efab36be68dcba52ce9d01ba860
-
Filesize
1.8MB
MD55198d7149fea3a3658fe78de729743d7
SHA131b88bf4fbd4773dd38738acef666aceee43195d
SHA2564eb39771f7cc3865d97e151a66ae434661dcf7025f706405fd27f673b736ba6a
SHA5126a19f847bb8d2acc5621c5fe2ff1ffae8d031c261620ed3cbb5eae472638388baecbdbeac3ff9720ec44d1b870d2f0fd7bef78fee9431f6178df7f5b44a6230b
-
Filesize
123KB
MD59fc68c74fcdf2ca6c0252ed39de275f0
SHA184438de24f01ade937d2f1a0f70c797e616b7199
SHA25687751b4f40f3cf03b3e2a1e5eb9ef248ad79a8f47304d2a527939ed634ac8f2c
SHA51210feb413b7a89f92339dd1d1a9538fdb22009279778d985f6649faf0af7cd1d5998adff439cad6b99ec2aade6b235b72385a83d9943e5b5898eb7ecdd7a398e8
-
Filesize
123KB
MD5918890b3fc5a3dc184a57d027ead24da
SHA1c638f375f49bc4731b633bdc001aeeadf9462039
SHA25657d03ac2189851d5069515da6997e12ca307c145aa21679da001477df5f81836
SHA512fd9bfe41ce4041dc8c7db17df2a2164a24ea96372c212399c499f94d1fb7d95d430b8a7eb86041b9b2db88dfca0cf39e53cba2dad1e346aebed29e4ca5deb2ef