Behavioral task
behavioral1
Sample
bcb6ad179a9fcd920d5f734aeedc0140_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
bcb6ad179a9fcd920d5f734aeedc0140_JaffaCakes118
-
Size
112KB
-
MD5
bcb6ad179a9fcd920d5f734aeedc0140
-
SHA1
2aecb6dd11e266d1b651da787f294310157d8424
-
SHA256
5a3146bff9340530cc56568a09d32eb89667b77099411195dd9eb0730eefa219
-
SHA512
c0da7e565d5aeb678f59202a6b70be98bd01b76353e25ba168cca76b61119fddcc6a8b0104aa9eb1ae6219193a3f8ac050f9db8b28197ea723d7f148a37c9121
-
SSDEEP
3072:V2k9qax+wB4fxV58H/382soPKyO9d/Hwir:Vn9qax+24Re3PCR/QI
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcb6ad179a9fcd920d5f734aeedc0140_JaffaCakes118
Files
-
bcb6ad179a9fcd920d5f734aeedc0140_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d858800c1194fd4112b585275b24bec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcAddress
HeapAlloc
GetProcessHeap
GetLastError
ReadFile
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexA
GetCommandLineA
Sleep
CreateThread
WinExec
GetCurrentThreadId
GetStartupInfoA
SetLastError
GetTempPathA
GetTickCount
FindResourceA
LoadResource
CreateFileA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
FreeResource
MoveFileA
lstrcpyA
DeleteFileA
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
ExitProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
GetModuleFileNameA
lstrcmpiA
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
GetSystemDirectoryA
lstrcatA
GetFileAttributesA
user32
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
wsprintfA
PostThreadMessageA
GetInputState
UpdateWindow
advapi32
AdjustTokenPrivileges
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
RegOpenKeyExA
RegSaveKeyA
RegCloseKey
RegCreateKeyExA
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
RegCreateKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegDeleteValueA
RegDeleteKeyA
LookupAccountNameA
ntdll
NtQueryVirtualMemory
RtlUnwind
strstr
strchr
ZwUnmapViewOfSection
_strcmpi
msvcrt
realloc
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
rand
malloc
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
_controlfp
netapi32
NetUserGetLocalGroups
NetApiBufferFree
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ