Behavioral task
behavioral1
Sample
JaffaCakes118_4434fadc1dd4bbef4cf1bf21bff4087d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4434fadc1dd4bbef4cf1bf21bff4087d.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4434fadc1dd4bbef4cf1bf21bff4087d
-
Size
120KB
-
MD5
4434fadc1dd4bbef4cf1bf21bff4087d
-
SHA1
141c1de5e37b488e5cfe4e94a7f195a9da108006
-
SHA256
fef623df64d7686836c7baf57390479034bb97859644894b36942dd260713195
-
SHA512
977499bcdefa47f1ff0200b30bceffcde3d23d74e45628c2f6b9f55efb3d3da89bea14cc8d9d4b1dff700bf23466e0a2914f5a2c02e6b7e4f458e25262d55d17
-
SSDEEP
3072:IDIast3bUlE+eFnCzURm3eqgAjUWinJnbMyDH:IgRlnQteqgA1qoyr
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4434fadc1dd4bbef4cf1bf21bff4087d
Files
-
JaffaCakes118_4434fadc1dd4bbef4cf1bf21bff4087d.exe windows:4 windows x86 arch:x86
16fa76159b116b2ae1d2b68dfa370a3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
LocalFree
LocalAlloc
RemoveDirectoryA
CreateFileA
WriteFile
ReadFile
SetFilePointer
GetModuleFileNameA
GetLastError
ExitProcess
GetCurrentProcess
GetVersion
DeviceIoControl
CreateProcessA
TerminateThread
MoveFileA
DeleteFileA
GetLocalTime
GlobalFree
GlobalUnlock
GlobalSize
ReleaseMutex
GetTickCount
OpenEventA
SetErrorMode
OutputDebugStringA
RaiseException
GetStartupInfoA
GetModuleHandleA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
msvcrt
_except_handler3
strrchr
rename
strncpy
atoi
strncmp
_errno
wcscpy
strncat
_beginthreadex
calloc
free
_XcptFilter
exit
_acmdln
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
__getmainargs
_strnicmp
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ