Behavioral task
behavioral1
Sample
8622ac73873c0c984e5cee3a2b17e0ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8622ac73873c0c984e5cee3a2b17e0ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8622ac73873c0c984e5cee3a2b17e0ff_JaffaCakes118
-
Size
114KB
-
MD5
8622ac73873c0c984e5cee3a2b17e0ff
-
SHA1
7004d73a71ba7c8f7b2d918661efddc2131cf966
-
SHA256
d10048ab2df52eaa259349b3ccd5386ccddb6bcc058001874ce2d9b163e1c823
-
SHA512
9604d24b83a1babd67508c482775097a4711b3afeb560fcee245f95aff3491868659b73338d358623fe4cfbfc59c859ab3e539ba7dec9226d9901705d2ea35da
-
SSDEEP
3072:lKyA9gZ8mrM47MQHEL/a3VnK8ahRsKeRINIr:lKy2eHETaFTartoINI
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8622ac73873c0c984e5cee3a2b17e0ff_JaffaCakes118
Files
-
8622ac73873c0c984e5cee3a2b17e0ff_JaffaCakes118.exe windows:0 windows x86 arch:x86
8d9d8c25847e73bdb83b96fdfe349859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
LocalSize
GlobalMemoryStatus
GetSystemInfo
OpenEventA
MoveFileExA
SetErrorMode
SetFileAttributesA
Process32First
lstrcmpiA
Process32Next
GetCurrentThreadId
GetModuleHandleA
lstrcmpA
TerminateProcess
GetLocalTime
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
CreateThread
OpenProcess
GetCurrentProcess
GetVersionExA
Beep
GetModuleFileNameA
GetTickCount
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateEventA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
EnterCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
ResumeThread
LoadLibraryA
GetProcAddress
CloseHandle
DeviceIoControl
user32
ExitWindowsEx
MessageBoxA
GetWindowTextA
GetAsyncKeyState
GetKeyState
EnumWindows
GetSystemMetrics
GetClassNameA
GetWindowLongA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
mouse_event
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
GetForegroundWindow
EmptyClipboard
SendMessageA
GetClipboardData
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
IsWindowVisible
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
DispatchMessageA
GetWindowRect
MoveWindow
FindWindowA
OpenClipboard
TranslateMessage
SwapMouseButton
GetMessageA
CharNextA
wsprintfA
SetClipboardData
ShowWindow
gdi32
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
CreateCompatibleBitmap
DeleteObject
BitBlt
SelectObject
advapi32
RegSetValueExA
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
QueryServiceConfigA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
EnumServicesStatusA
OpenSCManagerA
shell32
Shell_NotifyIconA
SHGetFileInfoA
msvcrt
_beginthreadex
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
memcpy
exit
realloc
strncat
_mbsupr
_mbsstr
wcscpy
_errno
strchr
strncmp
atoi
rename
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInClose
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInPrepareHeader
waveInAddBuffer
ws2_32
WSACleanup
WSAStartup
gethostname
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
setsockopt
connect
htons
closesocket
recv
ntohs
socket
gethostbyname
WSAIoctl
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ