Behavioral task
behavioral1
Sample
8ae96d58bb7e1e9f35c8791911bdf97b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ae96d58bb7e1e9f35c8791911bdf97b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ae96d58bb7e1e9f35c8791911bdf97b_JaffaCakes118
-
Size
91KB
-
MD5
8ae96d58bb7e1e9f35c8791911bdf97b
-
SHA1
1fc5848bf311a36a36511054abb3dffd33c96cd6
-
SHA256
3688bd7f57c0b221edeb8cd0e2314b3ac54087699ec847bb52611f0679836a18
-
SHA512
572b2f475d0564b8e4aeee4f11c392cdcf0c62099611cc07b9ace4dac1ea6e9e00f0b55d605885e833cdbb01755693caf17aa6649ba91d66db33b8b72d614c38
-
SSDEEP
1536:9Jvpm0PGt6rj5w0OqcocxrD5n6eDwDueLic+8ifnIcQ63xF+0j11BO:XvpmuGt6rj5w0Oqcoc+ekDVLi580nIc2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ae96d58bb7e1e9f35c8791911bdf97b_JaffaCakes118
Files
-
8ae96d58bb7e1e9f35c8791911bdf97b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c21d2bb98ff69599be53eb4b3e87033a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetModuleHandleA
SetUnhandledExceptionFilter
GetCommandLineA
SetFileAttributesA
Process32First
GetSystemDirectoryA
GetCurrentThreadId
CreateThread
GetStartupInfoA
Process32Next
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
lstrcmpA
DeleteFileA
GetProcAddress
GetFileAttributesA
SetLastError
lstrcpyA
FindResourceA
LoadResource
SetFileTime
CloseHandle
MultiByteToWideChar
ExitProcess
Sleep
lstrlenA
lstrcmpiA
lstrcatA
GetLastError
GetTempPathA
GetWindowsDirectoryA
FreeLibrary
LoadLibraryA
CreateDirectoryA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendMessageA
GetDesktopWindow
LoadIconA
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
mouse_event
GetInputState
GetTopWindow
wsprintfA
PostThreadMessageA
advapi32
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
EqualSid
msvcrt
malloc
strchr
strtok
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_controlfp
_adjust_fdiv
_except_handler3
realloc
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ