Behavioral task
behavioral1
Sample
e1513eb3c48fe7ec87855d1dff7a6d9a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1513eb3c48fe7ec87855d1dff7a6d9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1513eb3c48fe7ec87855d1dff7a6d9a_JaffaCakes118
-
Size
288KB
-
MD5
e1513eb3c48fe7ec87855d1dff7a6d9a
-
SHA1
243163ebce697f190bc69b561317ccfe4f9d3f96
-
SHA256
5b2cb4100ff9f5a4e7955c13c1f3521a389d6c044ff43b9dc99dbd985ab57df3
-
SHA512
5854846b8c661075ddc0f0a0f433727dbf1ae7881d679af46fb9ea6e3f2af1b336e114dfc86d1ff3d1f06994c265f5a6c854852b12264e20a601006f2a296306
-
SSDEEP
3072:tSnCvQOdRo4Lj5IoWqriyZk5AmBiq243FkhjmvO5WwKANGBvE/DcX4CefgjtohF2:pR1IEk9uGOF5vpNGBvyDcNqpvYH
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1513eb3c48fe7ec87855d1dff7a6d9a_JaffaCakes118
Files
-
e1513eb3c48fe7ec87855d1dff7a6d9a_JaffaCakes118.exe windows:4 windows x86 arch:x86
61d8afd2e39289ec1bdf9371ab9d5183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
SetFilePointer
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CloseHandle
GetLastError
GetStartupInfoA
GetSystemTime
GlobalAlloc
GlobalLock
GlobalFree
HeapAlloc
HeapFree
lstrcatA
RemoveDirectoryA
FindNextFileA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
SetUnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TlsGetValue
SetLastError
FindClose
LoadLibraryA
GetProcAddress
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetVersion
RtlUnwind
RaiseException
MoveFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetCommandLineA
user32
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
EnumWindows
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
GetMessageA
MapVirtualKeyA
WindowFromPoint
keybd_event
CloseClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
SetRect
GetDC
GetCursorPos
DefWindowProcA
ShowWindow
DispatchMessageA
SystemParametersInfoA
CloseDesktop
IsWindow
SendMessageA
CreateWindowExA
TranslateMessage
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveOutClose
ws2_32
WSAStartup
WSACleanup
setsockopt
htons
gethostbyname
socket
closesocket
select
send
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
__WSAFDIsSet
ioctlsocket
gethostname
ntohs
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
psapi
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ