Behavioral task
behavioral1
Sample
8d3e738a480079c43a5d1df92478a943_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d3e738a480079c43a5d1df92478a943_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d3e738a480079c43a5d1df92478a943_JaffaCakes118
-
Size
91KB
-
MD5
8d3e738a480079c43a5d1df92478a943
-
SHA1
674ebb7537d71f2f66dd97d97eec3b218ce23a6e
-
SHA256
dc679363e8262cf059616b4b9a8602c2ace007bd59bf9aaa6091934eae8806a3
-
SHA512
79c1dc4c3abda7a58fe46d8a050a605ab97e3c3f70c9a81db8aa070cb9add03e3688b0c0cf1830c2185992abf4596b2cec42ced130a7071ad0329433bbd2e422
-
SSDEEP
1536:9Jvpm0PGt6rj5w0OqcocxrD5n6eDwDueLic+8ifnIcQ63xF+0j11By:XvpmuGt6rj5w0Oqcoc+ekDVLi580nIca
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d3e738a480079c43a5d1df92478a943_JaffaCakes118
Files
-
8d3e738a480079c43a5d1df92478a943_JaffaCakes118.exe windows:4 windows x86 arch:x86
c21d2bb98ff69599be53eb4b3e87033a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetModuleHandleA
SetUnhandledExceptionFilter
GetCommandLineA
SetFileAttributesA
Process32First
GetSystemDirectoryA
GetCurrentThreadId
CreateThread
GetStartupInfoA
Process32Next
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
lstrcmpA
DeleteFileA
GetProcAddress
GetFileAttributesA
SetLastError
lstrcpyA
FindResourceA
LoadResource
SetFileTime
CloseHandle
MultiByteToWideChar
ExitProcess
Sleep
lstrlenA
lstrcmpiA
lstrcatA
GetLastError
GetTempPathA
GetWindowsDirectoryA
FreeLibrary
LoadLibraryA
CreateDirectoryA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendMessageA
GetDesktopWindow
LoadIconA
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
mouse_event
GetInputState
GetTopWindow
wsprintfA
PostThreadMessageA
advapi32
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
EqualSid
msvcrt
malloc
strchr
strtok
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_controlfp
_adjust_fdiv
_except_handler3
realloc
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ