Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    15/02/2025, 22:00

General

  • Target

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk

  • Size

    4.8MB

  • MD5

    57cea51ae2f9dd757c3a29254d1408f0

  • SHA1

    a02db3677599c89d451a1570faed6de33e7786f8

  • SHA256

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197

  • SHA512

    aa7cd526a1654ff6e1d090edb22d01274d568c2fb601a7de345b1a8b538ac18076ba4e22c92b3e8f04e045d12dc7b4d09e06a2963e90fc781db8ecb6e30285ef

  • SSDEEP

    98304:4wBQqxi0spTtKKRCWVBmBqSC+dgehxN96bemdEIbvhpkXLb/FR24Vl03B:ZBQqxi0spTtKKRCWVBm8GxzQVdEAPkXS

Malware Config

Extracted

Family

hook

C2

http://176.65.134.87

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xjqhagprr.ahdckqkzu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4212
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xjqhagprr.ahdckqkzu/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4239

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e3786247172eab3ac5e91d9fed6bf09c

    SHA1

    b1e3fe4982211fd8aded1208c75b4d5a81e616df

    SHA256

    821272808f377c9670defd46f956ec0371be2358791b275950fd53267e86d762

    SHA512

    93787d1aa9ac1c336658baa3a7a21868011b0c5432b13e0869120e97a1adacd250361c024a03cd52e8fed5679bcc038e8a10fe924b202afe130731cc7eb02e0d

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    381b878efdfe711c2abf66329f2c7bbc

    SHA1

    9b34b8f015f429b874be34e1a29bdd1a60b1ec06

    SHA256

    ef66773309a97b548c6f5980d89235861498c6f46e799d217164525e362d5b9b

    SHA512

    98b548f70913c05cbe29d281733cf41077c85174619ec32f32d767f608f0da215909e214007ca95d1d7646c1bc689bf4d0f9deac012af9ed22f88c1b566d71d2

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5af085468870685341191bc666193c2e

    SHA1

    9e8ac95c36bef02efb034075fe3985d06cdfb340

    SHA256

    4cdd856c7a7b45beb163ab3265e7bd5c7ca3e3277fdcaa17f3f336532351dae4

    SHA512

    16d21fcc4949b03725d28573c7905f44a23315f86474d321e04dedaa7ce872c0b182983e8c966fa5d00d363c46b71d93f3fb62ed829f6c3e77ed1e9ef76413f3

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    4bb5fa3da1336871450a1a3d5411add6

    SHA1

    33a1664e672745ddca701066222f13ada5c3edf4

    SHA256

    fb99a67210eb5b110da2902eabde70fd253e8151f22c3ad935a037ee898fa29e

    SHA512

    94e4a0e360672aef4d45e8b4d94571025424caa10ba414ffc76b042cb9cdd233d87553d1da04a9d89595a36fa7e6fc8b92650b2a658ec6769ea4c927e93a989a

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7aec25acfce755542fd3b9b658114688

    SHA1

    2d6b19326778b579995df6bdf7981ce413f8667f

    SHA256

    78e89fb28e6db69fb9ed5b766caafc7ef2fb85624893f0c8349231be71fa6854

    SHA512

    7384681b4952909f8eef5e1a6cdfe2b828c470d2d8852734e2b1d3640069c0054ec8580d07bc2d4a2e3263a5f43b6da180d8ad8254faa6d5f3469ef78b0d19e7

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5d6fc2a09624566c12a1eab6fd6b605d

    SHA1

    c6d7d571300ed86ad2a823380b64a7c00d3588d0

    SHA256

    ee6469f440ff44085fcca224deab99a8f89ca29755d5b77c79e06af71178e712

    SHA512

    5b702668c5ebcb30d203e745d37f15b8a33b06da03bf9e5a1ca807f2f2c4a726c91944870b863b5c16b06c45aead101fe73b38a04bd7df614026294239082f82

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    39012d6a93b49b87d861016ab84194fe

    SHA1

    1c51a71a636648a2e643f2d4acc731b01be6737d

    SHA256

    8610e725efdd9a3bdb67b7e3a6023bcb704992d40f7442381fbd9cdc873713ea

    SHA512

    c2d8965cdcc6838ffaf947a33ae773a07a0d95182cca118475f6e3e8842d2e8ce5ff51f4595712b378f920c32089a9e6eb301fd4a6ce0e5bb24eb8c73dc98df3

  • /data/user/0/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    8938ff55aa2d2ec78731a56c8ab05fc0

    SHA1

    7b747a1ca3d0f3f58ff6b2f2a9b8ffb889a60b33

    SHA256

    3422581ed9077d0fb7d659b08ae3bfe775995365fad15fb26081fd18fe875e86

    SHA512

    1e75cbf295b43af563f96b0f2689f098e766188dbe406ac6d1052962914a216e9770f211815c5e3203a3e3087b3c727884e152b57627239d29b5b33ae8e25c52