Behavioral task
behavioral1
Sample
88e06c10757c24d9d32aa2cf1f7bb06c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88e06c10757c24d9d32aa2cf1f7bb06c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88e06c10757c24d9d32aa2cf1f7bb06c_JaffaCakes118
-
Size
584KB
-
MD5
88e06c10757c24d9d32aa2cf1f7bb06c
-
SHA1
eff7fecb0fb5285103b63343361fb50193bbf094
-
SHA256
d1ef14748e47a3b0c3c59d8a1382081274aa87097525871474ff432c52fc2af9
-
SHA512
4b088859c9888c3ab44ffd4c9e1cf033b9869b667574eeff54f1006527126d6826840f34ba52e1ed01ed45248343ff4d2c95ec1770c7e24053518f3f24ba5111
-
SSDEEP
12288:PDj/GwZVQQxfnr+TK7r79/J77W4foznMqlJM5xbVmr:PDiSVQQxfnr+TK7r79/J7ffynBJM5xbq
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88e06c10757c24d9d32aa2cf1f7bb06c_JaffaCakes118
Files
-
88e06c10757c24d9d32aa2cf1f7bb06c_JaffaCakes118.exe windows:4 windows x86 arch:x86
872cd0bda8cecfab4004e8063ae3c0c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetReadFile
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
CopyFileA
CloseHandle
WriteFile
SetFilePointer
user32
RegisterClassExA
UpdateWindow
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
EnumWindows
SystemParametersInfoA
IsWindowVisible
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
DispatchMessageA
MapVirtualKeyA
LoadIconA
DefWindowProcA
GetCursorPos
DestroyCursor
CreateWindowExA
TranslateMessage
GetMessageA
GetCursorInfo
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
??2@YAPAXI@Z
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??1type_info@@UAE@XZ
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 409KB - Virtual size: 409KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ