Analysis
-
max time kernel
123s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
04/10/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
111c13be5f87e5da98cee5c9e7bb7c5f_JaffaCakes118.apk
-
Size
3.6MB
-
MD5
111c13be5f87e5da98cee5c9e7bb7c5f
-
SHA1
04d85727953f45e923a46378108802f11169c334
-
SHA256
4bbc485e0e2e7cce46124655042322b9a5f7e4f22725ba05cef2547584bcaade
-
SHA512
8782aad0322d1020b4e4bb0683a98fe76745730dc71ca574cc1499fd81540fe8ca43f62b80f0cff59b9fa37fb52a778fbcc6da72d4ccc0d980ae03b956f0e372
-
SSDEEP
49152:Ho0uOTcTcpGiB0ILUDKRXJBGpiyxszT8kjypq9gZd+IXhIheKc2Jg2Q9iPWc:Ho0Hki3LpxDGpiyxszT8c9gZc/9Jgl6L
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener cn.com.JMXK.livewallpaper -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo cn.com.JMXK.livewallpaper -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo cn.com.JMXK.livewallpaper -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone cn.com.JMXK.livewallpaper -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cn.com.JMXK.livewallpaper -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal cn.com.JMXK.livewallpaper -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo cn.com.JMXK.livewallpaper -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo cn.com.JMXK.livewallpaper
Processes
-
cn.com.JMXK.livewallpaper1⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4980
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD541e0ae37b9156222f6a78416e0d7cf69
SHA1517207f540d72bccefd213d43038872b89156c08
SHA256a43dbad29faac5144d5d4b37b05ff52cc8e74b07f23bde68643357f8eddbd0dc
SHA512960a1c23985e57e9a7fab464f32334e3974a3b6449959d142d47d8a37fb86046406f65a23a8499e63f0ea28b4fb8dbb3204d5958c7e098e340602fe9898cd728
-
Filesize
15B
MD56ed9d30c609a0f0291167b25f5e7f262
SHA1248ad16c9c78021c4497a5c9966dbb8ca681cb6b
SHA256344ab6adc36078d4cb025066d5374d2936e2ee1c2bd26315da74f66010decb35
SHA51250efb06b56f8545ae6ecd4d8c354ee18413b82ca23ac123de50d79f6aab3bee074b827646bca44ca13025740ee272b4eee1b4c18d5d62584f9220bb6a98c95ed
-
Filesize
36B
MD5f1d556441ac45eeb5814bb61a06f9e89
SHA1d3aae4a4c303bb42aa18f38a561788dc327ee8d0
SHA2566a303e059525232b723a22a5ef885f314acbb149782a86e3b318f35bcd19e49d
SHA51224121e8211d54e43392ffee79dfeabd78c7ec9b899bf261c8458d6c00a605bfb19ff20d22f62339bda3aeeb92ee7d59c552fe4bc869938e2855080e46ebdf6ec
-
Filesize
68B
MD5387817a1a55e3924501a91a220ed6f6f
SHA140e51a0e4f250f8d834079db4642e3b820f43f28
SHA2561b5e4ea624d56912dc13aced56fff87d40e0ab9ed1a369c6edfcc65d851a5cfc
SHA512e726b7f65a06a5948cfb0fc6b518702b9e253939cb60487317d38435eb84cec9f41bf4068d7e958c8b3123ab4085aeb8c2cb053639dad20736051a6fed6c7dd7
-
Filesize
32B
MD514621f8f785086494bd65f0264431fa9
SHA1e1f81c037d7ac1cd0e6a35f470381f661f47de6b
SHA256ffc901a0e2efaea23b3a02067e12201f6879eea3225bee8765c8e028423432ec
SHA51253a9c5872a802027d7d506aa2cc3284c535651f1c0c0205d5fa38865650a3430bd248890dfd974cc59131ae42bc4e95ce59b2c028de245bd4ff75b49287d0547
-
Filesize
26B
MD521a9598116cd2aa2e258610a247d7d42
SHA1974bc0683070ce796c4c1ecf93028184f9b8cab4
SHA256e80034e3232f572a2e91c3f75fb5d311e812fb04fb55e81bb12630915f2b3230
SHA512df7c6519d049f4b9e1288cb94060bd30a5b92e06572ee4a03640e164f76ae9b176e723d8b033c6573c0d0417c98b6a6926b66f64bdc41347fca98fcf4fc382d1
-
Filesize
13B
MD599e48790bb29370028ea82901faaf075
SHA1e9ad736b72ca80830c543b5dadd0a27f51d20aad
SHA256599bc67a9f564f88db93676501a9d3a10f0eebf291ca9405f2154a7a9467a43b
SHA51220aaf2fd64d3019134e5b24839cdb08a9ae1f03297a5840db688a1e93b7d12aefe1cf01697dddad85afd25f6a6ccbcaa3fe493fd59173e3e3830eaadbfa00064