Behavioral task
behavioral1
Sample
d212185321856ce803830d0482a69946_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d212185321856ce803830d0482a69946_JaffaCakes118
-
Size
149KB
-
MD5
d212185321856ce803830d0482a69946
-
SHA1
d3f04afea00d0a5f69a85ca6b9b52115013b398d
-
SHA256
37f0746ed662e18136112736161f23548309b8c683e87b23f2d061b4e92c092c
-
SHA512
dd0f1b82e19c89345993bc4718a2fe28df8c39afdf80cd708257834d1637ca30407c98a5b2cbe65b69e698a01287f099b94d7d7b0a26eb61612ec64113b5987f
-
SSDEEP
3072:8hzaS9oMIIIWBIh1Oh1M6oiim3oTogEDzUUJIxe:8hzHoMII9BIh1rybo0jbJke
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d212185321856ce803830d0482a69946_JaffaCakes118
Files
-
d212185321856ce803830d0482a69946_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bebf8c95acf51763772d1168886f6b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32First
CreateToolhelp32Snapshot
LockResource
SetUnhandledExceptionFilter
ReleaseMutex
Process32Next
GetCommandLineA
SetFileAttributesA
CreateDirectoryA
GetCurrentThreadId
Sleep
GetModuleFileNameA
SetFilePointer
ReadFile
GetSystemDirectoryA
lstrcatA
GetLastError
SetLastError
lstrcmpiA
lstrcpyA
FindResourceA
LoadResource
GetWindowsDirectoryA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
CloseHandle
FreeResource
ExitProcess
CreateMutexA
user32
GetInputState
BlockInput
GetMessageA
wsprintfA
PostThreadMessageA
StartServiceA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateK
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ