Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
141s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11/09/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
da5d0f934eaabaf05f3d15ba652a9b15_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
da5d0f934eaabaf05f3d15ba652a9b15_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
da5d0f934eaabaf05f3d15ba652a9b15_JaffaCakes118.apk
-
Size
9.1MB
-
MD5
da5d0f934eaabaf05f3d15ba652a9b15
-
SHA1
f4da43991e5dcb89d0e44c09316ef96d34f33eb4
-
SHA256
3da7f0b52c02fe069bed1a6b307bfbd2b4cc3cac320e5c0295dc194d6a789681
-
SHA512
70858f34f715e2842ad57ebc0b5668dc341514cc730edffdc50f60f20a7b0bc297976e4fa3beb7638d0f1a426b15358012380014fff4e9ad7ee9c239a263084b
-
SSDEEP
196608:GFQO6mHqoOOIMUoS6O1POhH7j7MQUjTK7exClwL884rv:Gr6ATOOIMD+2937MVQwLW
Malware Config
Signatures
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cutt.zhiyue.android.app630655:push -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 5 alog.umeng.com -
Queries information about active data network 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cutt.zhiyue.android.app630655 Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cutt.zhiyue.android.app630655:push -
Queries information about the current Wi-Fi connection 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cutt.zhiyue.android.app630655 Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cutt.zhiyue.android.app630655:push -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cutt.zhiyue.android.app630655:push Framework service call android.app.IActivityManager.registerReceiver com.cutt.zhiyue.android.app630655 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cutt.zhiyue.android.app630655
Processes
-
com.cutt.zhiyue.android.app6306551⤵
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
PID:4250
-
com.cutt.zhiyue.android.app630655:push1⤵
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4289
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD50683d4578671d242186bd2ac59a2d771
SHA101e9b4c9e48e9f811eade0dcfef18020b1f11614
SHA256c17b80c329a625df236d3ffa50b64a97793bf08828aa65561f4a9fac61fcf101
SHA512ad9a2eed35ebeef304aba4dcd836c3de3ec7e0807c1c318683450704a6c887d0ad8e3883d2101e0feb5e2b8de207b0236115bbdef08b0af4e5fcf0a2bffa5b05
-
Filesize
76KB
MD56f44904b5597184560b63b0c756de14b
SHA1dfc8f56facd88d1549775987595eceef8671be75
SHA256ecfbedf4261ead5db031b6d7bd4e6f390418150e90d09d3dbd679f67c7ce631c
SHA512325cab5bd422b0b2cb295a2c1f146b6cd094f8c9a6d86a9853643976e3a83ff3c52d2c5bc3e5822a981d8e5b78569386d4fc79ca5a2b0f81ad8c80e6ed302ba8
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD57ebab2c206e7e22cc03b05265efe2702
SHA19febb80bd846a837775d4dc39dbae605ab5e21e0
SHA256eae83b784ee6348db723b0aea91b391e6a6716240d84d55f4463b9009ad6b173
SHA5129be1b2cc92424c6d573f53c2adc3af77be1973d6a0379ec7b5e5b4bac1458900122742a355ed82b7bbd54e21f341469fc47cedd1867742b36c6f72b8794abee6
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
88KB
MD5b80a425adc024ecd2a804885e99a1ddf
SHA172e6845749e612a9f59d479cce452d2d4bf4bf2d
SHA2562866d4fbcb7ff7d648122ab52d85aa739ea2c4993b344ef0679a13d7e7f70131
SHA5126deb065ff0c477ca86fdf45febc4bd8f6dd42a366d5427c32b46f5272e38cc13841100092179b10ce7cf9cbf6f86ccfde60127324d0a4fdbf91e398df305ffa9
-
Filesize
7B
MD538ca9bbebb79ef4ca025383a45544597
SHA1628758529ce7e126a52036b359253ab7fbf6acf4
SHA2566539a6ab7b5c52809bc720ac1c5a21c349e28a230d33c339232a2cacf053a271
SHA512e68fc40b80453096d53cda7888d866a1438f34796be5ca6b0f08c7ad4aa2974ab8b40be821473916d41ca07ad3c67877725b3c392e04181506a90f4e085adf65