Analysis
-
max time kernel
4s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02/10/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk
Resource
android-x64-20240624-en
General
-
Target
0a6837bb31efd91ec8df1419587bfb5d_JaffaCakes118.apk
-
Size
2.7MB
-
MD5
0a6837bb31efd91ec8df1419587bfb5d
-
SHA1
8eb24fe20470acac40b3ae406824ca12b4ca68a7
-
SHA256
70a04cc83ff92c98074f9d6780a928b31213c7ae9c376a7bc58f223d1f92afb7
-
SHA512
46ee83478c5feb17e5d395297f998ca758734ef655dea047255aeaac5ea42eb7588d49559c47997781f4646459a93dbea9fde159630d8653b0f78213b4452fa2
-
SSDEEP
49152:2t3LexIoht0RJBKAIINRO8/m4JWvGoZB41CjP6/JreBjYqhtSLjOR:2RJohiIINz+4EuoZi62sjYqhtSLjOR
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.witskies.yoyogo/files/1727868236898.apk 4268 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.witskies.yoyogo/files/1727868236898.apk --output-vdex-fd=47 --oat-fd=48 --oat-location=/data/user/0/com.witskies.yoyogo/files/oat/x86/1727868236898.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.witskies.yoyogo/files/1727868236898.apk 4217 com.witskies.yoyogo -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.witskies.yoyogo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.witskies.yoyogo
Processes
-
com.witskies.yoyogo1⤵
- Loads dropped Dex/Jar
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4217 -
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.witskies.yoyogo/files/1727868236898.apk --output-vdex-fd=47 --oat-fd=48 --oat-location=/data/user/0/com.witskies.yoyogo/files/oat/x86/1727868236898.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4268
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD57458007d4aa78ec3fa53839e5bf828bc
SHA126a34dcaa4a70e6b7ce10ac0753e3befd408f53a
SHA2563c79a5d8c1881df5ee5ff7d1a2658e03171936a992175d99103bd4c270769aad
SHA51211433b8a7140834d93a940713c7e614a592fa53200e6728d2ed19a3c16fbb1c7fadcf3b08c3ea4bc1e587d3b65096e6083d96841fbb35832a38e76337e58014e
-
Filesize
107KB
MD5a0532cf3213c94e922eb51650d67cdab
SHA18f9aabab8764146325fd5915e57028dcb345dde0
SHA256fac3bb3f7e81f1975c6c3413b04c091fdcc133323c75822d19707bf99ee9f601
SHA51214686da589937099c781d1d125161121cf8df7c13de5029c6c640079ae81b7c3efd8b969dd7408c2b8424122bb880641eea6c0a2d6519bc33062afd2e7a99b1e
-
Filesize
314KB
MD556316514f7aed2c51a4cabf099c9b922
SHA141740d6fff5dd1c8424e33238e96e3a5c850ccc7
SHA25659cc5941d395b7c19c5dc7978355896cb46f51480ef4c6627f6c5bab28d28cdb
SHA5129c04048e4e8e62dbdf8b6bf1760dba9e860733aee818c1a9413a1fdb73fbc714bd2b99529574c820e94b621a8f80231002554ad93c9d483f9d605644ecf4a916