Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 15:16
Behavioral task
behavioral1
Sample
d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe
-
Size
272KB
-
MD5
d23b32b5d9a1ddb4dace9c7f94f2c36b
-
SHA1
46c595e580719a4c54f55b4041f81d6e50ab4062
-
SHA256
3c26dd6817e143a4dd61ba134f037537da27d5df532840b721a5656e29111690
-
SHA512
e1c7498f1a53d4280814e9e59cbbb33228261185c48289c16b554f3139a1404814fe1acd699f6899a0a2933781e87c7c54dea7a7d83a12edd71e46a14a5ed19d
-
SSDEEP
3072:s/YfCR8cbcx0zQUeGMw70JXiRdTqltV4JNyK5n8Q3nT:sgflCcx0zQC70A+VayKn3nT
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral2/memory/468-0-0x00007FF7BC360000-0x00007FF7BC3BE000-memory.dmp family_anchor_dns behavioral2/memory/468-1-0x00007FF7BC360000-0x00007FF7BC3BE000-memory.dmp family_anchor_dns