Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
01/10/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
055b0eb9d03985ffcacee25e9e5c222a_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
055b0eb9d03985ffcacee25e9e5c222a_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
055b0eb9d03985ffcacee25e9e5c222a_JaffaCakes118.apk
-
Size
5.9MB
-
MD5
055b0eb9d03985ffcacee25e9e5c222a
-
SHA1
f1fcc13baf252798712897879ffa97bd871c5270
-
SHA256
efa30468c14f7c1b29f99169fe59e1db4a17cf1491d5ed8905a3c6bf98c2339d
-
SHA512
fe90e2f90e5be1260fabfb3784b70922cb89d218498b95305ba9220ce44da0d0268b0f769de5e69b4e23cd49d14f4544dcd2b6529586106f820ed63b0d484f87
-
SSDEEP
98304:UFIwLRriuuU651UVH5rL8ylCYCQDA9xwWiH00Nvm9SP1xgeWeYJ+Crlcxrpvg:eIuRriC65Ct5rLPxCQDnP4StSeWZruxy
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.laoxinwen.app -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.laoxinwen.app -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.laoxinwen.app:pushservice -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 11 alog.umeng.com -
Queries information about active data network 1 TTPs 2 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.laoxinwen.app Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.laoxinwen.app:pushservice -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.laoxinwen.app -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.laoxinwen.app:pushservice -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.laoxinwen.app -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.laoxinwen.app
Processes
-
com.laoxinwen.app1⤵
- Queries information about running processes on the device
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4357
-
com.laoxinwen.app:pushservice1⤵
- Acquires the wake lock
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4427
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD53be3fa867cc57e4fa2f521e6870db989
SHA15aefedea563ead726486a5335dc7e81d1da59311
SHA2567587dec3362dd9ff4d3eddc8f74f5ff349c0432afdc0437d86cd73d5c755c693
SHA512b663759f4596fc09325734080febd27965f44161d2dd62d27e925270f61c40487b5035fe76d156a26413115c1d9fb0690735de17a11470a3a37d4974afbd11b9
-
Filesize
88KB
MD53a372e96d0a8982f162b2c8a364415df
SHA1d043a4880afc1e7ff4dae662f37e179cb1d55469
SHA2566e60c7d1089cae47a95c8f3b8316a39b12d98f4a9c71d7623c0964af581195da
SHA51273ff1b68eb9b635d8776d8c26294de904c018137928381a7b491005c2deab0c977ca49e6f78d518d8fc44b68f1ee30647931df5d5252683874e166fd57bcc2cb
-
Filesize
563B
MD585061676c7a653f33908f9b5d31f4cd6
SHA193f01ef1fe95d6341bc136c8dec857d357fe7b26
SHA256186ff617c7c55410cc314e837ff90da8a3fe3eaba2a8029110ec5c06c180dde0
SHA512c308530f12eb8334513dce93a7f23f9310bbb94f45537d7e79d4e564193711385c5faa3106cf5f12d36952ed5eaae900563c081fe1a7758e5021c1f99b35d01b
-
Filesize
512B
MD53f5231ae5cc8d544aeddec9acc56572a
SHA147356028543a9d7c3f3bca12641fc9463a1ff1e2
SHA256de7fd568941234f32941177098294814dbb56b9e77c2ae19cfda5e21dbe16d85
SHA512a3e1eeee59699274d2971d4235416ffa5a902978b8ccd864b5686c645d9ac978a16ff44b66d2b94346cbc4d8ee567c9a98785c68831461eb7b78b1198082304a
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1