Behavioral task
behavioral1
Sample
ae9cac3330f073dedc737b9902421e99_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae9cac3330f073dedc737b9902421e99_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae9cac3330f073dedc737b9902421e99_JaffaCakes118
-
Size
99KB
-
MD5
ae9cac3330f073dedc737b9902421e99
-
SHA1
c86b951b942bba18e2d6e98e22c15607881ddf64
-
SHA256
a5b1d30d156bbef122426c0517bc7b8544c41006f35ff5d71630f1e8ad20de9b
-
SHA512
b66360292d4daa7332d931332abc06e4b3d69ebdf64240904364d282726ee71c5a087456301e30cd6031b6e77e99462292c4194977fd0c545b010e446a29647b
-
SSDEEP
3072:eQ4I6c8jV8YEU/p/5xoSHglTccqIZPLJgBjCpQ:eQL6c858YEUBBMTl9ZTJgBW2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae9cac3330f073dedc737b9902421e99_JaffaCakes118
Files
-
ae9cac3330f073dedc737b9902421e99_JaffaCakes118.exe windows:4 windows x86 arch:x86
44d4acecabe255908a1d72c95d74ddac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
SetLastError
GetFileAttributesA
lstrcmpA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetModuleFileNameA
CreateToolhelp32Snapshot
GetTempPathA
ReleaseMutex
CreateMutexA
GetCommandLineA
GetCurrentThreadId
CreateThread
GetTickCount
lstrcmpiA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
Process32First
Process32Next
CloseHandle
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
HeapFree
Sleep
lstrlenA
SetUnhandledExceptionFilter
user32
DispatchMessageA
DefWindowProcA
wsprintfA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
TranslateMessage
GetCursorPos
SendMessageA
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
GetMessageA
UpdateWindow
RegisterClassExA
LoadCursorA
LoadIconA
GetInputState
PostThreadMessageA
CreateWindowExA
mouse_event
ShowWindow
advapi32
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
GetUserNameA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
ChangeServiceConfigA
OpenServiceA
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
GetLengthSid
msvcrt
_except_handler3
realloc
malloc
strchr
??2@YAPAXI@Z
__CxxFrameHandler
_EH_prolog
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
__dllonexit
_onexit
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ