Behavioral task
behavioral1
Sample
0736877ff512a162143e191cca37bfe3_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0736877ff512a162143e191cca37bfe3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0736877ff512a162143e191cca37bfe3_JaffaCakes118
-
Size
99KB
-
MD5
0736877ff512a162143e191cca37bfe3
-
SHA1
a5a15743496ee1dca52a279c8645f5486c2b1085
-
SHA256
4a8189ef12d3bcbfbd07c3dad1e18de392d4f88c83cbad89143236a1fcd502c7
-
SHA512
049cf7f4956af6adca3a39471be45377a3dfe2947cbd63b7ddaf8bede0f7cebec9c2e3291f95bec7835862b7b56fe6c4b848b3c78cf4cf52878e11543235ec4a
-
SSDEEP
3072:eQ4I6c8jV8YEU/p/5xoSHglTccqIZPLJgBjCpV:eQL6c858YEUBBMTl9ZTJgBWn
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0736877ff512a162143e191cca37bfe3_JaffaCakes118
Files
-
0736877ff512a162143e191cca37bfe3_JaffaCakes118.exe windows:4 windows x86 arch:x86
44d4acecabe255908a1d72c95d74ddac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
SetLastError
GetFileAttributesA
lstrcmpA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetModuleFileNameA
CreateToolhelp32Snapshot
GetTempPathA
ReleaseMutex
CreateMutexA
GetCommandLineA
GetCurrentThreadId
CreateThread
GetTickCount
lstrcmpiA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
Process32First
Process32Next
CloseHandle
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
HeapFree
Sleep
lstrlenA
SetUnhandledExceptionFilter
user32
DispatchMessageA
DefWindowProcA
wsprintfA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
TranslateMessage
GetCursorPos
SendMessageA
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
GetMessageA
UpdateWindow
RegisterClassExA
LoadCursorA
LoadIconA
GetInputState
PostThreadMessageA
CreateWindowExA
mouse_event
ShowWindow
advapi32
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
GetUserNameA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
ChangeServiceConfigA
OpenServiceA
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
GetLengthSid
msvcrt
_except_handler3
realloc
malloc
strchr
??2@YAPAXI@Z
__CxxFrameHandler
_EH_prolog
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
__dllonexit
_onexit
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ