e:\depot\Ghost\GSSTrunk\Ghost\ghost\src\GhostSrv\vs2005\Win32\Release\GhostSrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0eb438a31022c4b59bf88a008233288_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0eb438a31022c4b59bf88a008233288_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0eb438a31022c4b59bf88a008233288_JaffaCakes118
-
Size
717KB
-
MD5
b0eb438a31022c4b59bf88a008233288
-
SHA1
b3cc9f8dc323f975f397d2e0c57974923afb89b5
-
SHA256
d7673bbdf32578412b57a9fdb0b5377fc0cf9a10b918d3e54145eaa252e210c8
-
SHA512
60cc07b8bd3fcdcc238fba5823f25b2f548ddb484f22aa9747a22229f070e03f9fb342f09db822bcb7bd44f3a95c6bd2636644397b0e32d3aa7fc518f1e66f02
-
SSDEEP
12288:pwNAuVUr5I5qT8NF36vb30uX5Yu3EMl3kOGY:pw6uVUraWvvbXceZF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0eb438a31022c4b59bf88a008233288_JaffaCakes118
Files
-
b0eb438a31022c4b59bf88a008233288_JaffaCakes118.exe windows:4 windows x86 arch:x86
83a4a4c1fc645afca59b53ce3fcf379c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ioctlsocket
getsockopt
WSACleanup
WSAStartup
WSARecv
WSAIoctl
WSAWaitForMultipleEvents
WSASendTo
socket
bind
getsockname
listen
WSASocketA
setsockopt
ntohs
inet_ntoa
inet_addr
WSARecvFrom
WSASetLastError
closesocket
accept
gethostbyname
WSAGetLastError
gethostname
WSACloseEvent
htons
ntohl
htonl
WSACreateEvent
recv
WSASend
send
sendto
WSAEventSelect
WSAAddressToStringA
recvfrom
WSAEnumNetworkEvents
imm32
ImmAssociateContext
kernel32
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetVolumeInformationA
GetShortPathNameA
FileTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
CreateThread
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
Sleep
SetHandleCount
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEnvironmentVariableA
ReadFile
MoveFileA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetDiskFreeSpaceA
FlushFileBuffers
GetFileTime
SetFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
SuspendThread
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalFree
MulDiv
SetLastError
CreateEventA
ResetEvent
SetEvent
CreateFileA
CloseHandle
VirtualQuery
GetThreadContext
GetCurrentThread
IsBadWritePtr
GetCurrentProcess
IsDBCSLeadByteEx
IsValidCodePage
lstrcpyA
GetFileAttributesA
GetFullPathNameA
GetExitCodeThread
WaitForSingleObject
FormatMessageA
CreateDirectoryA
DeleteFileA
ResumeThread
LocalFree
ExitProcess
GetLocaleInfoA
GetTickCount
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
GetModuleFileNameW
GetVersionExA
GetCurrentDirectoryA
LockResource
GlobalLock
GlobalUnlock
GlobalAlloc
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetCurrentProcessId
IsDBCSLeadByte
GetStringTypeExA
InterlockedDecrement
InterlockedIncrement
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
lstrlenW
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetTempFileNameA
SetFilePointer
ExitThread
user32
SetWindowRgn
SetCapture
LoadCursorA
GetNextDlgTabItem
CreateDialogIndirectParamA
IsZoomed
GetSysColorBrush
UnregisterClassA
DeleteMenu
DestroyIcon
SetParent
SetRect
WindowFromPoint
GetDCEx
LockWindowUpdate
FillRect
GetMenuItemInfoA
InflateRect
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetWindowThreadProcessId
IsWindowEnabled
ShowOwnedPopups
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
CheckMenuItem
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
DrawIcon
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
wsprintfA
FindWindowA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
SetPropA
TabbedTextOutA
EndDialog
LoadIconA
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
DialogBoxParamA
MessageBoxA
LoadStringA
PostQuitMessage
OemToCharBuffA
CharToOemBuffA
SendMessageA
EnableWindow
GetParent
GetFocus
KillTimer
SetTimer
ReleaseDC
GetDC
GetWindowRect
GetSystemMenu
EnableMenuItem
GetDesktopWindow
PostMessageA
UpdateWindow
GetClipboardData
CharNextExA
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
CharNextA
CharUpperA
MapWindowPoints
gdi32
DeleteDC
CreatePatternBrush
CreateSolidBrush
CreateRectRgnIndirect
PatBlt
LPtoDP
Ellipse
GetTextMetricsA
SetRectRgn
CombineRgn
GetBkColor
GetPixel
CreateRectRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
CreateFontIndirectA
GetTextExtentPoint32A
GetStockObject
CreateEllipticRgn
SelectObject
SelectClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
ExtTextOutA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
GetObjectA
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegSetValueA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyA
shell32
SHGetFileInfoA
FindExecutableA
DragFinish
DragQueryFileA
ExtractIconA
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoInitialize
OleRun
oleaut32
SysFreeString
GetActiveObject
VarUI4FromStr
VariantClear
SysAllocString
VariantChangeType
VariantInit
SysAllocStringLen
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
netapi32
Netbios
Sections
.text Size: 440KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vrdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE