Behavioral task
behavioral1
Sample
6803e41094c183f47308817a0e60179f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6803e41094c183f47308817a0e60179f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6803e41094c183f47308817a0e60179f_JaffaCakes118
-
Size
436KB
-
MD5
6803e41094c183f47308817a0e60179f
-
SHA1
7c11e3b90b11134b51676e7e36e21812687e88f9
-
SHA256
bedc7264c60d8548da0360d04ee441e1314117e0980b5060daa5c985eaa17451
-
SHA512
0115fbac59b8fc3f0ee03f62cb6e779600ac28b7ac49c299a1be449472b21832b7a7a477f8ce799ffd1a717dcc58ea0af1d5becd73d61011a8d481d3c16e690e
-
SSDEEP
6144:HmUdjIQHiMtiWB0mL7t8J56p3/L5/Ax4G7v4G7AWFC:BdiuB0md8r6NDeLJA1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6803e41094c183f47308817a0e60179f_JaffaCakes118
Files
-
6803e41094c183f47308817a0e60179f_JaffaCakes118.exe windows:4 windows x86 arch:x86
7de6c07dec6c8a546893f5a5f743d9d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
CreateThread
ExitThread
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
GetACP
SetFilePointer
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
WriteFile
GetCurrentProcess
SetErrorMode
GetOEMCP
GetCPInfo
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
InterlockedExchange
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GlobalFlags
lstrcpynA
GetProcessVersion
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateEventA
GetCurrentThreadId
SetThreadPriority
SetEvent
WaitForSingleObject
MultiByteToWideChar
Sleep
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
LocalFree
ResumeThread
SuspendThread
VirtualProtectEx
WriteProcessMemory
GetThreadContext
ReadProcessMemory
SetThreadContext
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
DebugActiveProcess
WaitForDebugEvent
ContinueDebugEvent
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
PtInRect
LoadStringA
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
DestroyWindow
GetDlgItem
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
GetClassNameA
GetWindowTextA
IsWindow
EnumThreadWindows
EnumWindows
wsprintfA
FindWindowA
GetWindowThreadProcessId
GetWindowLongA
UnregisterClassA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
SelectObject
RestoreDC
SaveDC
CreateBitmap
DeleteDC
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
wininet
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestA
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ