Behavioral task
behavioral1
Sample
8948bfede19cb5ef92bf58a92ed2caf7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8948bfede19cb5ef92bf58a92ed2caf7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8948bfede19cb5ef92bf58a92ed2caf7_JaffaCakes118
-
Size
732KB
-
MD5
8948bfede19cb5ef92bf58a92ed2caf7
-
SHA1
2adcd6b333dae1f652a6e1e8ab2b7ff99af15d1c
-
SHA256
90495235cf70c639610b9aafd379e0421c4fb723bef2ae7db5786b3f3b179c10
-
SHA512
361348a4f129f7361b1370da999df101f7684314cf061c5184d69fbea0abcf3198004b3d4937b855648ec27a9ac3ba999a955ffe04a1b652c2ce1a6eaf3c581e
-
SSDEEP
12288:6yaJlAghv3r+TsPditWKcsyH2x1MM5LXUFKdgH:6nlAghv3r+TsPdiPcfHEMM5LXU3
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8948bfede19cb5ef92bf58a92ed2caf7_JaffaCakes118
Files
-
8948bfede19cb5ef92bf58a92ed2caf7_JaffaCakes118.exe windows:4 windows x86 arch:x86
7fd39542f81815f5d2cbc4a164723717
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
kernel32
GlobalAlloc
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
SetPriorityClass
GetThreadPriority
GetCurrentThread
GetPriorityClass
GetCurrentProcess
GlobalMemoryStatus
GetTickCount
GetSystemInfo
GetModuleFileNameA
GetStartupInfoA
OpenProcess
Process32Next
ResetEvent
lstrcpyA
InterlockedExchange
GlobalLock
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetModuleHandleA
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
GlobalUnlock
GlobalFree
MultiByteToWideChar
Sleep
lstrlenA
WideCharToMultiByte
DeviceIoControl
LeaveCriticalSection
LoadLibraryA
GetProcAddress
user32
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
CloseWindow
OpenDesktopA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
wsprintfA
EndDialog
CreateDialogParamA
UpdateWindow
ShowWindow
SetWindowPos
GetDlgItemTextA
SetRect
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
OpenEventLogA
LookupAccountNameA
LsaClose
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LsaRetrievePrivateData
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
msvcrt
strncmp
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
strncpy
_errno
wcscpy
strncat
sprintf
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strnicmp
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
_beginthreadex
winmm
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveOutClose
ws2_32
select
send
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
closesocket
recvfrom
__WSAFDIsSet
gethostname
WSAStartup
WSACleanup
recv
ntohs
socket
gethostbyname
htons
connect
WSAIoctl
setsockopt
sendto
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 408KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ