Behavioral task
behavioral1
Sample
c7e3fdc67b2941f3a804698abb2955f2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7e3fdc67b2941f3a804698abb2955f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7e3fdc67b2941f3a804698abb2955f2_JaffaCakes118
-
Size
152KB
-
MD5
c7e3fdc67b2941f3a804698abb2955f2
-
SHA1
2d520d7404a03befedb8b6e40f1a8673075e9e1f
-
SHA256
d87061ce7283ffae76e4a4c59583b2c85a89eeef52d550f24a25c4aad2286a35
-
SHA512
f432796efb3c63f1c4d9da0b1faeec9a2b7266a496e08c29f45421a017fff5daea45dbed30def1363ff87dfac2704e32a474656bef1bfca275d5bd2d3c94f3d2
-
SSDEEP
3072:UvUHexyY1t/Vvh8Q3aHS4ktdH5lfZbh0tt2/Y4xeIKhYOZLwA368:cUSxrayjdZ1ZbWi/vxrK7ZLwO5
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7e3fdc67b2941f3a804698abb2955f2_JaffaCakes118
Files
-
c7e3fdc67b2941f3a804698abb2955f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
b3673d1d003a64838033b0ff853506a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FreeResource
Sleep
WriteFile
CreateFileA
DeleteFileA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLocalTime
GetModuleFileNameA
WaitForSingleObject
CreateEventA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
GetTickCount
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
GetLastError
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ