Analysis
-
max time kernel
116s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
26-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
SLSDK.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
SLSDK.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
SLSDK.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
9edc71364c80c03d102a22dc68072a37_JaffaCakes118.apk
-
Size
3.4MB
-
MD5
9edc71364c80c03d102a22dc68072a37
-
SHA1
6b5f0150e9e9c737a3f6ce94fcdf630a633ab666
-
SHA256
192b40c3d71e04a7698bbe4ef6a274d9cf41de2aceccf2f5ce41ae7404d87b73
-
SHA512
df6aafdb6d5074c0983c03eb0f72bfa843bdf058d4c28599f5e07bc42fc61cacd245d4d3a82654146a7a9076ddf8609effb1f0329f6ebf32144ab6e34aaddb0c
-
SSDEEP
98304:8hWopSUW5PXsk2arQQRCBMwEda0bKI9EC:Z5P8k2arQLBMwEw1oEC
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.monitor.tester15ioc Process /system/app/Superuser.apk com.monitor.tester15 -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process Accessed system property key: ro.product.model com.monitor.tester15 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.monitor.tester15/app_sl/dex/SLSDK.apk --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.monitor.tester15/app_sl/dex/oat/x86/SLSDK.odex --compiler-filter=quicken --class-loader-context=&com.monitor.tester15ioc pid Process /data/user/0/com.monitor.tester15/app_sl/dex/SLSDK.apk 4284 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.monitor.tester15/app_sl/dex/SLSDK.apk --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.monitor.tester15/app_sl/dex/oat/x86/SLSDK.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.monitor.tester15/app_sl/dex/SLSDK.apk 4256 com.monitor.tester15 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.monitor.tester15description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.monitor.tester15 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.monitor.tester15 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.monitor.tester15description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.monitor.tester15 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.monitor.tester15 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.monitor.tester15 -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.monitor.tester15description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.monitor.tester15 -
Tries to add a device administrator. 2 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.monitor.tester15 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.monitor.tester15 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process File opened for read /proc/cpuinfo com.monitor.tester15 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.monitor.tester15description ioc Process File opened for read /proc/meminfo com.monitor.tester15
Processes
-
com.monitor.tester151⤵
- Checks if the Android device is rooted.
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests enabling of the accessibility settings.
- Tries to add a device administrator.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4256 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.monitor.tester15/app_sl/dex/SLSDK.apk --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.monitor.tester15/app_sl/dex/oat/x86/SLSDK.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4284
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD519df8a31fb37c64cc9c3a7626c1c2a4a
SHA1caedab35ebb979278623a49121165f2cb1962e49
SHA25624e625ee70aee9c6c2ee08a0f83ed8f529beaed7ae8d1364f55ee7e3f1bd2137
SHA512a3214c9d5aa5565410d39571bfe3c66ea0abf551ba66260ab1590110d4de4dd100cadca23260412c54d04c42999913178fd412c5dc24992c960768e20e0e88fa
-
Filesize
902B
MD5c3813557b38ece1b7d50c2bc41a60c8b
SHA1b3fb92a38353130196ba392c1e69f2943a2eae60
SHA256259dabdedfb35c1aa32eebf444438eb990a4e5b6a486982812c17a4226d959a1
SHA51254df1b3ae021ece71aab9a2bb5618d06d84f6e9a180f08fdc1c881df689c23a1a7b1542d2d3c30df5f198cbec7eaa1d2f929e59e3f84681faf18ddf60bca462a
-
Filesize
328B
MD59ca511b14eb2342ca245e8a65d156b69
SHA186177c02d39bbadc2c4b74624478dc7e4c995ddc
SHA25651070fa1a7136e191aba023cd6abacf579c47f0f2433693f830efedb2b547353
SHA51251ff95c27cb89655086334803ed2107453f9b314a814a11996f4af84c92e8bf131e04e51b5d91cae0eccc096ce8feb753c7acf84a1ee1cf1aefe842ba428f02b
-
Filesize
221B
MD500331136ab5321e176c68e5fd5835ac4
SHA1cd3d19a9ea797cfadc6fefc37aaa782a12cd070a
SHA2562995088268bd7321af8b9dc70a008800e270aec1b4fec0772179644829275af9
SHA51266d82cd8ee3c8d491c0f12f56a05fa2d3c5a79571d5b8f7f8840d6f6f0a0a70ceb6a4ab3454d0861779441211d565b67046952749e3c476d8abd1c0db215a943
-
Filesize
219B
MD5d536e7a30a83d62afacf528b4672b3e0
SHA1815a0ff6f75cc923f45e1eddd8ec2a9cdf28e1e9
SHA2569296ec39527fbd4ab534bfb57743365c8b8b9e44f36f8261b91320d69e400668
SHA512fb23fdbeafcf83f8ee00d12dfd111d101ff702d4ddb8b71e74018e91e96b765482d1205299efd8813998f1e2869d2d3703fa2330292cdc750257752bc2c865cf
-
Filesize
587KB
MD5c28ed93429f91238a8e0625212074157
SHA12c9c936d7a6a0decce464c9915e15d5b39ce8ca4
SHA256ef78a6b8a5822c3c44610ec2bcf444db48d3be13679f8b9b1e75a2342b52d48f
SHA512874fb284f7c7c4a764961cb759375245c496b9ec0c0e5fc1f712299f4da25e3ac0a159e4b73f49f06b590cade36bbf72347c250411db8a15ebc16575585b391c
-
Filesize
587KB
MD54e92f30bfa63f7885b1c47d3e6c08c80
SHA147f7d0d8e225d95fc3b2d63956ab36f5822416f0
SHA256a6fe70eb21d374eddbb1dae3addc42dbc9d9bb87950e67bb937ae4e912615404
SHA512c88265ca70980072e92cc612721e189017d59badfff1c09ce61ba9959d74f3b4049ed3562fb111253d5773e1046296f31fa490f12a4bf0cce22e63672a4317fd
-
Filesize
29B
MD568eba31471506d02c72f9c85326a95ba
SHA18370ca672ab7d4ad0c693f41286d2595fd2541ec
SHA256136d86e7ac6f30dcfd3b94d5c3f3099c15d936c61007c2d0b976a1f842a50318
SHA512db96cb313d1f9a09dc739f41c4670114a971e56b6aa6aeebf294f8042fac1ab2bc69bf817a073927818a99db988f6c29df058012ee954b153c9238afa2eb4fc2