Behavioral task
behavioral1
Sample
241da04cdd25a08e4ea8c20d76844f83_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
241da04cdd25a08e4ea8c20d76844f83_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
241da04cdd25a08e4ea8c20d76844f83_JaffaCakes118
-
Size
858KB
-
MD5
241da04cdd25a08e4ea8c20d76844f83
-
SHA1
a623fdc6ee50a543e8058cc746d4df899275c39a
-
SHA256
e73c0d540763afbad7eaa9737a4ecf613da3106d59c41afc8fc3ee629fd96758
-
SHA512
e736564d33b9d53c43570d404b11f158a07c51e75259226ef3678285d81c0ffed67ba80b2c031342b420fc6a00c9a4fe33c78b80ff9bd16749783882a59a390e
-
SSDEEP
12288:/M5REAfL3aKHx5r+TuxXzNWJBhiFHzsVK2o1:/M5RE23aKHx5r+TuxXzcBsFHUo1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 241da04cdd25a08e4ea8c20d76844f83_JaffaCakes118
Files
-
241da04cdd25a08e4ea8c20d76844f83_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e823d9b1eea64189ab47ad8b130d058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
GetModuleFileNameA
OpenProcess
SetFileAttributesA
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
WaitForSingleObject
GetLastError
CloseHandle
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
DeviceIoControl
GetVersion
LocalAlloc
FindClose
GetVolumeInformationA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
lstrcpyA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
RaiseException
GetModuleHandleA
gdi32
GetDIBits
DeleteDC
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
LsaOpenPolicy
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegCloseKey
LsaFreeMemory
IsValidSid
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
_CxxThrowException
strlen
??1exception@@UAE@XZ
_strcmpi
_strnset
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
fclose
fwrite
fopen
exit
atoi
strncmp
strncpy
_errno
wcscpy
strncat
sprintf
_beginthreadex
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??0exception@@QAE@ABQBD@Z
memcpy
??0exception@@QAE@ABV0@@Z
??1type_info@@UAE@XZ
winmm
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInPrepareHeader
waveInStop
waveOutWrite
waveInAddBuffer
waveInStart
waveOutOpen
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInReset
waveInUnprepareHeader
waveOutGetNumDevs
waveInClose
ws2_32
select
send
inet_ntoa
closesocket
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
socket
WSAStartup
WSACleanup
gethostbyname
htons
connect
setsockopt
WSAIoctl
inet_addr
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 428KB - Virtual size: 889KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ