Behavioral task
behavioral1
Sample
a97ab8488e6c2d8f769baf5e8fc11d78_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a97ab8488e6c2d8f769baf5e8fc11d78_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a97ab8488e6c2d8f769baf5e8fc11d78_JaffaCakes118
-
Size
160KB
-
MD5
a97ab8488e6c2d8f769baf5e8fc11d78
-
SHA1
622b1f1e37cdc445e2ae209bf067872b52ffed86
-
SHA256
23b2db0d066e121e3b695f0c7261126d7b004104f447e8cf50eaf7f29f459947
-
SHA512
9bb374e9c3b34c178c784d87d7f6c22bd3265bb9089238352ac38f462490947ab01e68a572d372b4727fc390ca4206e5767406b72e04852c34e993a318268671
-
SSDEEP
3072:8Ln230NZlEFgt1oWOQXO1O10+RXUR91cNKcqyF9tcivlSd8/ij:8BSgzoWOQ+gz+pc0Dg9DvlSd8/
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a97ab8488e6c2d8f769baf5e8fc11d78_JaffaCakes118
Files
-
a97ab8488e6c2d8f769baf5e8fc11d78_JaffaCakes118.exe windows:4 windows x86 arch:x86
3182ae559a84cfc1f77bd71d8176ffc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
lstrcmpA
SetLastError
CopyFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
FreeLibrary
GetVersion
SetFilePointer
ReleaseMutex
DeleteFileA
GetCommandLineA
GetCurrentThreadId
GetFileTime
lstrcatA
WritePrivateProfileStringA
FreeResource
WriteFile
SizeofResource
LoadResource
FindResourceA
SetFileTime
LocalFileTimeToFileTime
LocalReAlloc
MultiByteToWideChar
CreateFileA
ReadFile
CloseHandle
LocalFree
GetTickCount
LoadLibraryA
Sleep
CreateProcessA
ExitProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
GetCurrentProcess
GetLastError
GetModuleFileNameA
lstrlenA
LocalAlloc
OutputDebugStringA
GetSystemDirectoryA
CreateMutexA
GetFileAttributesA
user32
GetInputState
PostThreadMessageA
GetMessageA
wsprintfA
MessageBoxW
CreateWindowExA
advapi32
RegOpenKeyExA
RegCreateKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
CloseServiceHandle
StartServiceA
OpenSCManagerA
CreateServiceA
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
RegQueryValueExA
shell32
ShellExecuteA
msvcrt
_strlwr
??1type_info@@UAE@XZ
__dllonexit
_onexit
strstr
rename
isdigit
strtoul
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
fclose
fwrite
fread
_stat
fopen
rand
wcslen
strchr
realloc
malloc
strncmp
Sections
Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pepack Size: 50B - Virtual size: 50B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ