Behavioral task
behavioral1
Sample
4d9e278b6bb68af52530f504c033bfdd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d9e278b6bb68af52530f504c033bfdd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d9e278b6bb68af52530f504c033bfdd_JaffaCakes118
-
Size
475KB
-
MD5
4d9e278b6bb68af52530f504c033bfdd
-
SHA1
204c1696f787db0464e72d9e18b62bba4874f398
-
SHA256
6fdbb723452b6d4145983c452ea0f338bcab28e7830a166b1cad55aea28a970e
-
SHA512
cd0ceb612e019e457b1af5bc1336b11106ab2a20fe2de13806569a750af53ac13e347572dc6c430bb03a73a659d60926b89f1187e0fdc9da2aca32e74b40ede6
-
SSDEEP
12288:PDj/GwZVQQxfnr+TK7r79/J77W4foznMqlJM5xr:PDiSVQQxfnr+TK7r79/J7ffynBJM5xr
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d9e278b6bb68af52530f504c033bfdd_JaffaCakes118
Files
-
4d9e278b6bb68af52530f504c033bfdd_JaffaCakes118.exe windows:4 windows x86 arch:x86
872cd0bda8cecfab4004e8063ae3c0c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetReadFile
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
CopyFileA
CloseHandle
WriteFile
SetFilePointer
user32
RegisterClassExA
UpdateWindow
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
EnumWindows
SystemParametersInfoA
IsWindowVisible
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
DispatchMessageA
MapVirtualKeyA
LoadIconA
DefWindowProcA
GetCursorPos
DestroyCursor
CreateWindowExA
TranslateMessage
GetMessageA
GetCursorInfo
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
??2@YAPAXI@Z
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??1type_info@@UAE@XZ
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 409KB - Virtual size: 409KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ