Behavioral task
behavioral1
Sample
5e1a5d8e91f5286e1278fbcccec9c2ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e1a5d8e91f5286e1278fbcccec9c2ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e1a5d8e91f5286e1278fbcccec9c2ff_JaffaCakes118
-
Size
121KB
-
MD5
5e1a5d8e91f5286e1278fbcccec9c2ff
-
SHA1
8b6610da68d08c1976d0dcc47319cc2eb99105ac
-
SHA256
f25c76fb7fffe0a42e8b58ffc5d518b4fe41cc70de76bfcfd089d6d3c8b2261d
-
SHA512
4bf7245d91e76d51eed6500323b1ed625397c7c71b2e4489826fd90820db30592abf13bcb9c4125ae132375bcd0c2e3b64191fd19b84f99e9e34cdc93e75edd8
-
SSDEEP
3072:IWuVWAvDpiLvZ10R3D8eyAgUERuHrz7M8xyb3H6tljaeOv3ov:FuJULvZ1CgEgUU7+yb3Hija2v
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e1a5d8e91f5286e1278fbcccec9c2ff_JaffaCakes118
Files
-
5e1a5d8e91f5286e1278fbcccec9c2ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
268f6557c13386aebec4127a55018573
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetProcAddress
CancelIo
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
InterlockedDecrement
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
wsprintfA
MessageBoxA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
ws2_32
inet_addr
send
select
recv
inet_ntoa
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
sendto
WSASocketA
htonl
gethostname
ntohs
closesocket
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE