Analysis
-
max time kernel
15s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
28-10-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
76c81a68d7dcd0bf9d77a7bfbb06178e_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
76c81a68d7dcd0bf9d77a7bfbb06178e_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
76c81a68d7dcd0bf9d77a7bfbb06178e_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
76c81a68d7dcd0bf9d77a7bfbb06178e_JaffaCakes118.apk
-
Size
7.0MB
-
MD5
76c81a68d7dcd0bf9d77a7bfbb06178e
-
SHA1
811b4b899eb962baee4347d291eb1cb1e7a91e86
-
SHA256
173a8591dcb43aa7e4b5d0dc5f9034d69aa78bc8827407d56047336614795cce
-
SHA512
593cbc1663d1c122064b918ff6bf5e513e4925b69de074a35f7e7958a48a00146f3dbcce7499c0ada4448af93fb215288d15a64c621c9c92ddcb74eccb1820f7
-
SSDEEP
196608:/4YBf9vwERe7BpxoPx0Lizxgxc3pwmfmCvfyNFsW:AYlewe7Bzo5oizxocZwNCvf2FsW
Malware Config
Signatures
-
SOVA_v3 payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4285-0.dex family_sova_v3 -
Sova
Android banker first seen in July 2021.
-
Sova family
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
Processes:
com.esavzt.kkjsdzp.jjyioc Process /system/app/Superuser.apk com.esavzt.kkjsdzp.jjy /sbin/su com.esavzt.kkjsdzp.jjy -
Processes:
com.esavzt.kkjsdzp.jjypid Process 4254 com.esavzt.kkjsdzp.jjy -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=&com.esavzt.kkjsdzp.jjyioc pid Process /data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/base.apk.classes1.zip 4285 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/base.apk.classes1.zip 4254 com.esavzt.kkjsdzp.jjy -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.esavzt.kkjsdzp.jjy -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.esavzt.kkjsdzp.jjy -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.esavzt.kkjsdzp.jjy -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com 8 api.ipify.org 9 api.ipify.org -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.esavzt.kkjsdzp.jjy -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.esavzt.kkjsdzp.jjy -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.esavzt.kkjsdzp.jjy -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.esavzt.kkjsdzp.jjydescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.esavzt.kkjsdzp.jjy
Processes
-
com.esavzt.kkjsdzp.jjy1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4254 -
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4285
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.esavzt.kkjsdzp.jjy/code_cache/secondary-dexes/tmp-base.apk.classes1305811048783865973.zip
Filesize3.8MB
MD5af18359e73a8cb9220e1cb36651a20a8
SHA1d59e4bfc5ce264785f69cbcfe9e4ea441995957f
SHA256559809e7f090330fcd407ef32b6cd7bd3aa3555eea05b69fbf1d163ef1f961d1
SHA512b1d8eca5ee2e35887a52ae528f77f4da1ebd3ce8f8cf1b523315d8eaab8e987d27d2c0f0963f6b98ecdd37edb3a82a857bf7ef1929a208341019096624ff087c
-
Filesize
10.2MB
MD5c52a9f66fb6565240003baec90de10ab
SHA1c8000accbdd9a3e8bf0dbad80a05b85126a14483
SHA2564fe33f9876c4a099688f052466d896f914afbbfe58f010ff267d6d4c201c4565
SHA5122d575872f8bfe0f78c24b326986d4659c2ca3e51a1b1939cc11da1c211679661c39a6aa54cb5eb76abf96260f98f36707004f131eb0796445419fddca7c58679