Analysis
-
max time kernel
16s -
max time network
22s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-10-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
excess.undrilled.improper.crushing.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
excess.undrilled.improper.crushing.apk
Resource
android-x64-20240624-en
General
-
Target
excess.undrilled.improper.crushing.apk
-
Size
2.4MB
-
MD5
eb0ad0b462c65a40c16d43c15cd06aea
-
SHA1
28b0a4559078eac3bd1c06b493c35408e3def804
-
SHA256
136d00629e8cd59a6be639b0eaef925fd8cd68cbcbdb71a3a407836c560b8579
-
SHA512
d5178c83b493999e380b68abc6511ace9c3296393f08bee01dd80582a752fa07a2658bd1d2d0ef3fed01cca9ef17b31c5e5e0c4986ea46ce91a19c9c10e42b58
-
SSDEEP
49152:oRkr6w6JVKUf5wj0FRaVeRyWogZqChiBx1gwxm:V2dJIg7PaV8yvgZnhWm
Malware Config
Signatures
-
pid Process 4214 excess.undrilled.improper.crushing -
Loads dropped Dex/Jar 1 TTPs 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4214 excess.undrilled.improper.crushing /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4279 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/data/excess.undrilled.improper.crushing/code_cache/oat/x86/decrypted.odex --compiler-filter=quicken --class-loader-context=& /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4214 excess.undrilled.improper.crushing /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4337 excess.undrilled.improper.crushing:webview_process /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4337 excess.undrilled.improper.crushing:webview_process -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId excess.undrilled.improper.crushing Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId excess.undrilled.improper.crushing -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground excess.undrilled.improper.crushing -
Performs UI accessibility actions on behalf of the user 1 TTPs 10 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone excess.undrilled.improper.crushing:webview_process -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS excess.undrilled.improper.crushing -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver excess.undrilled.improper.crushing:webview_process Framework service call android.app.IActivityManager.registerReceiver excess.undrilled.improper.crushing -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo excess.undrilled.improper.crushing:webview_process -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo excess.undrilled.improper.crushing:webview_process
Processes
-
excess.undrilled.improper.crushing1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/data/excess.undrilled.improper.crushing/code_cache/oat/x86/decrypted.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4279
-
-
excess.undrilled.improper.crushing:webview_process1⤵
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4337
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
975KB
MD5dfde1000d6b51cdc38b21ac5fbaa462a
SHA18389cd13c15f316d55f7909e6ae71f56dfa8ea1b
SHA25609e3db729b16cf271d9be99996334422b372bafaae9ba95f65828c5b2bc97d34
SHA5123f11d6d1c0f4063bb79771834959e8a9d10b7210138fbde88fdf504138ff74c4467b1ca746e341b845ebd10ceb82a122386c1f4f57e2a1ea33f1d51063b08038
-
Filesize
975KB
MD53eb5114b544c4c195d7d55f6c99f7868
SHA1f6f7cb27e2c3bb3b2ba8334924f0c7bd5ac701c5
SHA2562d217f39b0abb2c9c16783af3a2327b52d189f3d5ac479efefaaa982998a8c20
SHA51213f95117cb48e80ac99d10a255112032b563e33854c09944818ed7d733f66788517372f18a9f735feed9520a5682607e280de2b912178426d73973263214237a