Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
128s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
03/10/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
10468aa342f67971d8195367645286af_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
10468aa342f67971d8195367645286af_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
10468aa342f67971d8195367645286af_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
10468aa342f67971d8195367645286af_JaffaCakes118.apk
-
Size
702KB
-
MD5
10468aa342f67971d8195367645286af
-
SHA1
850444edd45e36b5564303cc1e307945edb51260
-
SHA256
becc9aac3788b294a60bc1af4689908c6d28db1022e12b0557e61d29f4e6cfc0
-
SHA512
bae79892cff59b0660226b4dee35f087cf375029c16107343e86fb815bc53b5426bc34d341e15c687328cc5b9e5877dc3370d11bf9ea84365298a17217663335
-
SSDEEP
12288:k5WvCdFywWsOqq+5+apmK2PGxwnmHrgUu+:kImyvqq+r4PmwnmHsUJ
Malware Config
Signatures
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser vn.adflex.process -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo vn.adflex.process -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wHentai24hNet -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.wHentai24hNet -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.wHentai24hNet -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.wHentai24hNet
Processes
-
vn.adflex.process1⤵
- Queries account information for other applications stored on the device
- Queries information about active data network
PID:4245
-
com.wHentai24hNet1⤵
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4279
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552b4dabf09d89cd49948feca62e68dd4
SHA11e1404e01b0e929485441c58855cdd1a784fbcec
SHA256294dca95442d1e90fff4b8a012137fe3c9118c91a4483a71c3c26e570b396000
SHA51219d7ee349078d2404f169e733b3c83de24f9d67b0775484fba263ce41a18b4fd4cfdcf74741ed3766b69dcf90fd5ca8666448d15971605757a66d600ae4ca462
-
Filesize
613B
MD50bf31eb8549c87a14661345bd7efc175
SHA1691f3711d192e7efb39bc9581dd29d809d3ab4c0
SHA256ca26020431af78c75bb3c4c55b6e6d00e7b5df043be2bbf3df05d4cbc6bcb4ae
SHA5122b2e87d9f6c7391b7e0b134970f4e6f6f765b686b385963ab00980bd10019d54db16f7cfc2be2ae73ea337e434abba08aa820f4b4add70134195170312fa4da7