Behavioral task
behavioral1
Sample
acac469d8749c9637fe6060e863abee8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
acac469d8749c9637fe6060e863abee8_JaffaCakes118
-
Size
252KB
-
MD5
acac469d8749c9637fe6060e863abee8
-
SHA1
07f6548ba6e6846073cab92b13fc9c73b61660f4
-
SHA256
72d3c0fc2f0a08561e22b55bc92faa6b0bbb3db8dd8c9195eef3daad6d998f25
-
SHA512
8e02b0af30d31201f17c6b1c79df511157a7391516265fd29551ed46a597b303c1655685cb0148f7f00c5e7541c27df2f1aaec5cdbcad174e47299394a667996
-
SSDEEP
3072:QdEv2jK+6l5dC9xAXMsK6kpSVRt81z5qiz6pMqMlEnmYppYySJLIvSFJ9:QLK+6lHCEXlkUneB5tFq8SmYsvFJ9
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
acac469d8749c9637fe6060e863abee8_JaffaCakes118.exe windows:4 windows x86 arch:x86
c78d9bb43e84fe4e6c31a9af658f5a51
Code Sign
73:17:52:20:c4:c6:a9:4c:f6:12:39:87:17:e0:9c:ea:dc:dc:36:7eSigner
Actual PE Digest73:17:52:20:c4:c6:a9:4c:f6:12:39:87:17:e0:9c:ea:dc:dc:36:7eDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetFileSize
FreeLibrary
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapReAlloc
GetStartupInfoA
GetTimeZoneInformation
GetACP
HeapSize
TerminateProcess
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentVariableA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
HeapAlloc
HeapFree
GetCurrentThreadId
CreateThread
CreateDirectoryA
GetCommandLineA
CreateMutexA
ReleaseMutex
SetUnhandledExceptionFilter
GetVersionExA
GetWindowsDirectoryA
WinExec
GetModuleFileNameA
MultiByteToWideChar
GetFileAttributesA
SetFilePointer
ReadFile
lstrcatA
GetLastError
DeleteFileA
SetLastError
lstrcpyA
Sleep
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
GetLocalTime
lstrlenA
GetModuleHandleA
ExitProcess
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
lstrcmpiA
GlobalGetAtomNameA
CloseHandle
shell32
SHGetFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
comctl32
ord17
gdi32
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comdlg32
GetFileTitleA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ