Behavioral task
behavioral1
Sample
2f62aa93673b50a99d926a3c7d1831a5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f62aa93673b50a99d926a3c7d1831a5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f62aa93673b50a99d926a3c7d1831a5_JaffaCakes118
-
Size
83KB
-
MD5
2f62aa93673b50a99d926a3c7d1831a5
-
SHA1
c438b38b17ed7ad06a09712c8d2c34471c8d2e25
-
SHA256
5714cccb1b45c1a582910b563760587d4fffc81a75241602ac0029ea19adcc77
-
SHA512
4050f56265081f736be6170d6caea3f14803307766b27843ee01679ab484d54ead2da760b192b709f3508d21832a2a65e5a846978d9b92118bcfdd364f99cfab
-
SSDEEP
1536:jHl13uBWty8hJQmDocPzgofxIsSsJEwJZKwdbtzHgI:jfIWt1JQmDoqzgSxIsSsJEwJZKwdbtz7
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f62aa93673b50a99d926a3c7d1831a5_JaffaCakes118
Files
-
2f62aa93673b50a99d926a3c7d1831a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5141e0dff2b6a0b12b25e779a6fe3eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
SetLastError
ReleaseMutex
CreateMutexA
SetUnhandledExceptionFilter
SetErrorMode
GetTempPathA
SetHandleInformation
FreeConsole
ExitProcess
GetCurrentThreadId
GetCommandLineA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetTickCount
MoveFileExA
GetSystemTime
WinExec
TerminateThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetVersionExA
GetCurrentProcess
GetModuleFileNameA
MoveFileA
ReadFile
GetFileSize
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LocalSize
LocalFree
GetWindowsDirectoryA
GetFileAttributesA
LoadLibraryA
GetProcAddress
lstrlenA
LocalReAlloc
FreeLibrary
InitializeCriticalSection
LocalAlloc
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
OpenEventA
user32
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetMessageA
PostThreadMessageA
GetInputState
CloseDesktop
SetThreadDesktop
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
wsprintfA
MessageBoxA
gdi32
DeleteDC
CreateCompatibleDC
GetDIBits
CreateCompatibleBitmap
BitBlt
DeleteObject
CreateDIBSection
SelectObject
advapi32
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CreateServiceA
RegOpenKeyA
OpenServiceA
OpenSCManagerA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
SetServiceStatus
shell32
ShellExecuteA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
strncat
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
srand
rand
strncpy
atoi
realloc
memcpy
strchr
strrchr
_except_handler3
free
malloc
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
ws2_32
getsockname
send
closesocket
gethostname
select
socket
WSAStartup
WSACleanup
WSAIoctl
gethostbyname
htons
connect
setsockopt
recv
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ