Behavioral task
behavioral1
Sample
24a585ad653919d3a27e4b6cc199f17f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24a585ad653919d3a27e4b6cc199f17f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24a585ad653919d3a27e4b6cc199f17f_JaffaCakes118
-
Size
480KB
-
MD5
24a585ad653919d3a27e4b6cc199f17f
-
SHA1
25525fd2cdeeb0f2cf044e2b31bd57f14bdbe0e3
-
SHA256
0a873e491487a58362ef6fbf5274341a4c58c59fa6e7cedf306e8ece8331b68e
-
SHA512
c7ea75b176ee930a1d519646f9f4752b2267a36d9a104f9264609da8953ca4cf9269d5df93c5855b3778cbff3bcef045613e73295ab4a2e530e8504fae0fb20b
-
SSDEEP
12288:P6sPJlAghv3r+TsPdmfWfKtqgG5q1OnM5fD:PLhlAghv3r+TsPdmcKUg4q0nM5fD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24a585ad653919d3a27e4b6cc199f17f_JaffaCakes118
Files
-
24a585ad653919d3a27e4b6cc199f17f_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b959b9914d7943029c6ed8621156c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
kernel32
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
GetLastError
RaiseException
FreeLibrary
GetModuleHandleA
lstrcatA
lstrcmpA
GetPrivateProfileStringA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetVolumeInformationA
WideCharToMultiByte
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
LeaveCriticalSection
LoadLibraryA
Process32Next
OpenProcess
GetStartupInfoA
GetModuleFileNameA
GetProcAddress
GetLogicalDriveStringsA
GlobalAlloc
user32
PostMessageA
OpenDesktopA
GetUserObjectInformationA
OpenInputDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetCursorPos
GetCursorInfo
GetDesktopWindow
GetDC
SetRect
GetClipboardData
OpenClipboard
SetClipboardData
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
SystemParametersInfoA
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetSystemMetrics
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
wsprintfA
EndDialog
CreateDialogParamA
UpdateWindow
DispatchMessageA
CreateWindowExA
GetMessageA
CloseClipboard
TranslateMessage
ShowWindow
SetWindowPos
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
SendMessageA
GetClientRect
CloseWindow
GetForegroundWindow
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
RegEnumKeyExA
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
LsaRetrievePrivateData
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
IsValidSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
msvcrt
free
malloc
strchr
_purecall
strstr
_except_handler3
strrchr
atoi
strncmp
strncpy
_errno
wcscpy
strncat
_beginthreadex
sprintf
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strnicmp
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
exit
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
winmm
waveOutOpen
waveOutGetNumDevs
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveOutPrepareHeader
ws2_32
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
inet_addr
inet_ntoa
send
select
closesocket
recv
WSACleanup
setsockopt
connect
ntohs
socket
gethostbyname
htons
WSAStartup
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ