Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_390ea996e28a03662d57a6a349c802fe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_390ea996e28a03662d57a6a349c802fe.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_390ea996e28a03662d57a6a349c802fe
-
Size
172KB
-
MD5
390ea996e28a03662d57a6a349c802fe
-
SHA1
3631d9dee73e837806bbb2c54ef497f51b468ed8
-
SHA256
48aaf0f25649fab8754b3d367ab8f79b2e77fe741d42cd3878049be0e9cb58da
-
SHA512
ae16c6a8309473d61c6b63190b6a644129237f47a534c43e3526bf505f5c39beb9b0f0542cdbf99460b47b2c4e9658b6de1f456c96d79bb252cc583f77d2b0cc
-
SSDEEP
3072:izFdf8Fw+ZTjSXmCyntSKYD2cFdMxZsG0gIY6nkFw3Sm07lz:qZ8hCyh82yuZTb6nMw3SmIl
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_390ea996e28a03662d57a6a349c802fe
Files
-
JaffaCakes118_390ea996e28a03662d57a6a349c802fe.exe windows:4 windows x86 arch:x86
2ef26b9a09b3c4ab359c9875f496a51b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleHandleA
InitializeCriticalSection
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
WriteFile
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
GetStartupInfoA
HeapFree
HeapSize
TerminateProcess
GetACP
VirtualFree
VirtualAlloc
IsBadWritePtr
GetVersionExA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
LocalFree
LocalAlloc
lstrcpynA
GetCurrentThreadId
GetLocalTime
WinExec
GetCommandLineA
CreateMutexA
ReleaseMutex
Sleep
SetUnhandledExceptionFilter
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetFilePointer
ReadFile
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
LoadResource
SetFileTime
SizeofResource
lstrlenA
MoveFileA
MultiByteToWideChar
GetVersion
CreateRemoteThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetWindowsDirectoryA
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GetProcAddress
user32
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
GetInputState
wsprintfA
GetMessageA
PostThreadMessageA
IsWindowEnabled
advapi32
RegQueryValueExA
GetUserNameA
CreateServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
comctl32
ord17
netapi32
NetUserGetLocalGroups
NetApiBufferFree
gdi32
PtVisible
GetClipBox
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
RectVisible
TextOutA
ExtTextOutA
SaveDC
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.kasssrl Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ