Behavioral task
behavioral1
Sample
09abce46d69f4f12657aa900f9548859_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09abce46d69f4f12657aa900f9548859_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
09abce46d69f4f12657aa900f9548859_JaffaCakes118
-
Size
175KB
-
MD5
09abce46d69f4f12657aa900f9548859
-
SHA1
04a08e7ae8421bbd0b852f1616db11fcfbaa5771
-
SHA256
5f97876b4f2fc4b642d874f55e8caf88a8ededbdebe933d50d9f8e1b4e35c388
-
SHA512
afb209d661cc7ce15f4823a65ce98e34a4d31890de1b77af56281fe756941a1818104479e8d1a8bb812b057be8a45bcfdfbb1f5ff886da2f14acc06a0964943c
-
SSDEEP
3072:6yQ2ituoLEdHCyFtsVKYWr60QJbEAKvaxTnvVc83sJrwKox0itFq:6NoCy0VRW+0QJbAUn9N8JrwKoxM
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09abce46d69f4f12657aa900f9548859_JaffaCakes118
Files
-
09abce46d69f4f12657aa900f9548859_JaffaCakes118.exe windows:4 windows x86 arch:x86
56fe96f7f65c0cd5815176225002fb3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
WideCharToMultiByte
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalLock
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
WriteFile
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
GetStartupInfoA
HeapFree
HeapSize
TerminateProcess
GetACP
VirtualFree
VirtualAlloc
IsBadWritePtr
GetVersionExA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpynA
GetCurrentThreadId
WinExec
GetCommandLineA
ReleaseMutex
Sleep
SetUnhandledExceptionFilter
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFilePointer
ReadFile
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
LoadResource
SetFileTime
SizeofResource
lstrlenA
MultiByteToWideChar
GetVersion
CreateRemoteThread
OpenProcess
CreateToolhelp32Snapshot
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
GetWindowsDirectoryA
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
FreeLibrary
LoadLibraryA
GetProcAddress
user32
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
GetInputState
wsprintfA
GetMessageA
PostThreadMessageA
LoadStringA
advapi32
GetUserNameA
CreateServiceA
LockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
comctl32
ord17
netapi32
NetUserGetLocalGroups
NetApiBufferFree
gdi32
GetClipBox
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
SaveDC
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.text Size: 67KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ