Behavioral task
behavioral1
Sample
87caa23b94ee79e51a6d053b902d5691_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87caa23b94ee79e51a6d053b902d5691_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87caa23b94ee79e51a6d053b902d5691_JaffaCakes118
-
Size
91KB
-
MD5
87caa23b94ee79e51a6d053b902d5691
-
SHA1
83b9e8c10ea66bd70757578c08db52eb014714d6
-
SHA256
62ffdbf3c4be3b3499c1f2df5bb99cac9fdc4b924f58fe8cc8ee253f4ba2e7fc
-
SHA512
311c13cc23d934b0d44386dd78b6cd5de0623b90daa48c5fd385c8fb2ee3cd8869fbac1457cc070f199830fc632eb40c16a385e1c9c97519ae521cb0f831190e
-
SSDEEP
1536:9Jvpm0PGt6rj5w0OqcocxrD5n6eDwDueLic+8ifnIcQ63xF+0j11Bk:XvpmuGt6rj5w0Oqcoc+ekDVLi580nIcs
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87caa23b94ee79e51a6d053b902d5691_JaffaCakes118
Files
-
87caa23b94ee79e51a6d053b902d5691_JaffaCakes118.exe windows:4 windows x86 arch:x86
c21d2bb98ff69599be53eb4b3e87033a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetModuleHandleA
SetUnhandledExceptionFilter
GetCommandLineA
SetFileAttributesA
Process32First
GetSystemDirectoryA
GetCurrentThreadId
CreateThread
GetStartupInfoA
Process32Next
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
lstrcmpA
DeleteFileA
GetProcAddress
GetFileAttributesA
SetLastError
lstrcpyA
FindResourceA
LoadResource
SetFileTime
CloseHandle
MultiByteToWideChar
ExitProcess
Sleep
lstrlenA
lstrcmpiA
lstrcatA
GetLastError
GetTempPathA
GetWindowsDirectoryA
FreeLibrary
LoadLibraryA
CreateDirectoryA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendMessageA
GetDesktopWindow
LoadIconA
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
mouse_event
GetInputState
GetTopWindow
wsprintfA
PostThreadMessageA
advapi32
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
EqualSid
msvcrt
malloc
strchr
strtok
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_controlfp
_adjust_fdiv
_except_handler3
realloc
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ