Analysis
-
max time kernel
140s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-11-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b11e7e40d2d41fd73dfe8bf4a4b640a2_JaffaCakes118.apk
-
Size
1.2MB
-
MD5
b11e7e40d2d41fd73dfe8bf4a4b640a2
-
SHA1
e666f0f5b4bc28fac6d2deb5c982036961696440
-
SHA256
e8671256db652571063e3d8a6e5df6645e0e4d77ed34454b0fbba65092d59bb9
-
SHA512
347da43684172cbae355c17b54c5eb8612a38a7b58add512ae347de77b7fb6492823da0f2638a065549c9b538f12e157b4d6e4e2bf2bd43ad7426101b2dcaecf
-
SSDEEP
24576:pNVdDF4EmyjWs8o9/yxNEZ/k9PKe18Ap+YhQ2ry+e12pBA2SmX5rmRtJx:pjQOKoMxNEZspK48BnxAf5rmRtP
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar --output-vdex-fd=107 --oat-fd=108 --oat-location=/data/user/0/toufa.sji.hxz/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&toufa.sji.hxzioc pid Process /data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar 4357 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar --output-vdex-fd=107 --oat-fd=108 --oat-location=/data/user/0/toufa.sji.hxz/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar 4253 toufa.sji.hxz -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults toufa.sji.hxz -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation toufa.sji.hxz -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo toufa.sji.hxz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo toufa.sji.hxz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone toufa.sji.hxz -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver toufa.sji.hxz -
Checks CPU information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/cpuinfo toufa.sji.hxz -
Checks memory information 2 TTPs 1 IoCs
Processes:
toufa.sji.hxzdescription ioc Process File opened for read /proc/meminfo toufa.sji.hxz
Processes
-
toufa.sji.hxz1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4253 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/toufa.sji.hxz/files/__pasys_remote_banner.jar --output-vdex-fd=107 --oat-fd=108 --oat-location=/data/user/0/toufa.sji.hxz/files/oat/x86/__pasys_remote_banner.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4357
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD52ad9fb4b2d9b333883b7e38f61c2fd2f
SHA15b85041452d173ed0d81d25b9ca78608a998e328
SHA256b9310a99f1b60959f6b725eea74623dc491adec55da740c17e8c7e02f35818f5
SHA5126fc04e1e22ebf8920b4928a8086cf3e0814d155f79f80d71622916f6a0911262382710e5ee2acea653db4b387730e201134592cb9992b14f3aef8b09d83bda90
-
Filesize
356B
MD548cc58ced3e55303a0a9e5a8ed5814f3
SHA1272f258eee086e5e09868f8b391bbeb9c1c3e5db
SHA256ec0680de8414cbdb99692d2dc6aae75cda3ee63f5722dbbe09f02bfc1cf84724
SHA512af6b40ec11b0937bb5af021e01b2e2f92782faa023344cc6077ff719e8691a72f1170c8228edf0c30d20455c3940c8ce13c65481db213bfb730588056b4c2b81
-
Filesize
231KB
MD59b6ae00fe6b2c395a73f9db433368397
SHA19c40cad90bafcccf0c4dd47e039679052193bd27
SHA2569e97c7ff62af03bc044792ba1997c37200dcdc6a6fd5318ec74c2c8d79655c95
SHA5128740096c0579663fa866fdda366aaefac3b27c7641a4b99a1aae60cc646e17d71b6750fe83d5e7bdcac42b674c7e13dfcb550a5eefabfe6262fdfaa2e7d7c039
-
Filesize
231KB
MD5c601107d24f96646ae86f74b0fea880c
SHA18a8ce84fe5b6e186ddcd69c8757de4fb1aae7ed1
SHA256939120d702d97dc47c6963d98dc1d2694e0fae5f5d5199c0755f54741a3c2a16
SHA512b573a0d74ea8c6e99c3ebad4ac7b42ce46940231f8a90c9b19c887c6c20356235241068d187aab2bae9914c3df84cbe80bca13b5b6d070247353f5e5eb282f33