Behavioral task
behavioral1
Sample
b77233a0c6f71f1f1e7795bfc9b74143_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b77233a0c6f71f1f1e7795bfc9b74143_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b77233a0c6f71f1f1e7795bfc9b74143_JaffaCakes118
-
Size
192KB
-
MD5
b77233a0c6f71f1f1e7795bfc9b74143
-
SHA1
14c433c96e5497fa9545d3590022d2caa9d373a1
-
SHA256
3511ff9beaaf3d528a9ce75364cbc0b3e06b02a68a8f5897e52d4e54ffbfc00b
-
SHA512
dbb5e8b59df0c3f468aeb1c49fc51a6367e559788efb06127a91bd5af955917ecaf7d9d35a08a2f3fd08a956d0302606378fd2ac2e969da6e15a74ccefa62d31
-
SSDEEP
3072:4TeTY1km5WBqwP3gs2Q/Xz7iasXMyC/hX6Txv3IUt7bEwk:4iTtiWBvtL7tlJ5up3Im5k
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b77233a0c6f71f1f1e7795bfc9b74143_JaffaCakes118
Files
-
b77233a0c6f71f1f1e7795bfc9b74143_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d4c746105ec68f3b3b28040325a9d96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
WinExec
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
TerminateThread
GetLocalTime
OutputDebugStringA
GlobalMemoryStatusEx
GetComputerNameA
GetTickCount
LocalSize
GetCurrentProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
ExitProcess
DuplicateHandle
HeapFree
HeapAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
CopyFileA
GetModuleHandleA
GetCurrentProcessId
GetCurrentDirectoryA
GetSystemDefaultLCID
ReleaseMutex
OpenEventA
SetErrorMode
MoveFileExA
SetPriorityClass
CreateMutexA
GetCurrentThreadId
lstrcmpiA
CloseHandle
GetSystemDirectoryA
CreateEventA
RtlUnwind
RaiseException
HeapReAlloc
TlsSetValue
TlsGetValue
ExitThread
GetCommandLineA
GetVersion
TlsAlloc
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsBadReadPtr
IsBadCodePtr
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
netapi32
NetLocalGroupAddMembers
NetUserAdd
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ