Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 15:16

General

  • Target

    d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    d23b32b5d9a1ddb4dace9c7f94f2c36b

  • SHA1

    46c595e580719a4c54f55b4041f81d6e50ab4062

  • SHA256

    3c26dd6817e143a4dd61ba134f037537da27d5df532840b721a5656e29111690

  • SHA512

    e1c7498f1a53d4280814e9e59cbbb33228261185c48289c16b554f3139a1404814fe1acd699f6899a0a2933781e87c7c54dea7a7d83a12edd71e46a14a5ed19d

  • SSDEEP

    3072:s/YfCR8cbcx0zQUeGMw70JXiRdTqltV4JNyK5n8Q3nT:sgflCcx0zQC70A+VayKn3nT

Score
10/10

Malware Config

Signatures

  • AnchorDNS Backdoor

    A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

  • Detected AnchorDNS Backdoor 2 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe"
    1⤵
      PID:2024

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2024-0-0x000000013F290000-0x000000013F2EE000-memory.dmp

      Filesize

      376KB

    • memory/2024-1-0x000000013F290000-0x000000013F2EE000-memory.dmp

      Filesize

      376KB