Behavioral task
behavioral1
Sample
8815ae6100fe79a21117ff32e8291ac5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8815ae6100fe79a21117ff32e8291ac5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8815ae6100fe79a21117ff32e8291ac5_JaffaCakes118
-
Size
639KB
-
MD5
8815ae6100fe79a21117ff32e8291ac5
-
SHA1
77a0ef2524c4f75f693200d969665a3e06e9ae47
-
SHA256
d0eb83bd8fb0cc7e8676b1a2198612417295b41d7606ec9786e30109d1fc1766
-
SHA512
6440b52961acc2f8831e01f7fef8f38466a24aab1134ffb26a2d15fb71bd946529fcbc673b96d0654cca7b66150e805b8d6826fc80f8326bc0529ef9b5499608
-
SSDEEP
12288:t4ddhJlAghv3r+TsPREfWZRJTUb5XfM5ALg:qblAghv3r+TsPREuRlU9fM5Ac
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8815ae6100fe79a21117ff32e8291ac5_JaffaCakes118
Files
-
8815ae6100fe79a21117ff32e8291ac5_JaffaCakes118.exe windows:4 windows x86 arch:x86
fc3c69139cf8d8b6f054ba601b7b7e84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
SetFilePointer
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
WriteFile
CloseHandle
CopyFileA
WinExec
GetModuleFileNameA
GlobalAlloc
GlobalLock
lstrcmpA
GlobalUnlock
user32
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
UpdateWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
DestroyCursor
BlockInput
SetThreadDesktop
CloseDesktop
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
PostMessageA
OpenDesktopA
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
DispatchMessageA
TranslateMessage
GetMessageA
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
keybd_event
SystemParametersInfoA
CreateWindowExA
GetCursorPos
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
LsaFreeMemory
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaRetrievePrivateData
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
malloc
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
??1type_info@@UAE@XZ
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveOutClose
waveOutUnprepareHeader
waveInGetNumDevs
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
netapi32
NetLocalGroupAddMembers
NetUserAdd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ