Behavioral task
behavioral1
Sample
JaffaCakes118_4be2a9de665301467b0dd453e57b5a50.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4be2a9de665301467b0dd453e57b5a50.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4be2a9de665301467b0dd453e57b5a50
-
Size
163KB
-
MD5
4be2a9de665301467b0dd453e57b5a50
-
SHA1
d333e56b8e5b87aa2860aa2a59906b1185acccf0
-
SHA256
46c2d0f17c31f952d875b89ed10a66d7819af8c3b66543713346a4d309f85133
-
SHA512
b3e732444d43f74c14b0e9b724aca06681da2d9859a6e2336a062703bd77c96c64c36eb824e6770357abf16d0fb3c3735426a515468aa36d120e1877c60a32fc
-
SSDEEP
3072:Dqc4+RRbe+n/3Mnw+GvRZrD8XUDTZDmTevKQpo6fmzQWe:Dj4+R5t/3vHR9D8XUvITA7plfm0We
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4be2a9de665301467b0dd453e57b5a50
Files
-
JaffaCakes118_4be2a9de665301467b0dd453e57b5a50.exe windows:4 windows x86 arch:x86
64695fde3a599b9bd232507c0c0495ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetVersion
DeviceIoControl
CreateProcessA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
TerminateThread
MoveFileA
DeleteFileA
ExitProcess
GlobalFree
GlobalUnlock
OutputDebugStringA
ReleaseMutex
OpenEventA
SetErrorMode
RaiseException
GetStartupInfoA
GetModuleHandleA
SetLastError
GetLastError
GetModuleFileNameA
SetFilePointer
WriteFile
CreateFileA
RemoveDirectoryA
LocalAlloc
LocalFree
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
FreeLibrary
CreateThread
GetLocalTime
GetTickCount
Sleep
InterlockedExchange
SetEvent
CreateEventA
VirtualAlloc
EnterCriticalSection
GetProcAddress
VirtualFree
DeleteCriticalSection
CloseHandle
LoadLibraryA
HeapFree
user32
SetCursorPos
SetClipboardData
EmptyClipboard
GetClipboardData
LoadCursorA
SystemParametersInfoA
SendMessageA
ReleaseDC
GetDC
GetDesktopWindow
SetRect
WindowFromPoint
wsprintfA
SetProcessWindowStation
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
PostMessageA
IsWindow
SetCapture
MapVirtualKeyA
keybd_event
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
GetCursorPos
ExitWindowsEx
CharNextA
TranslateMessage
DispatchMessageA
CloseWindow
advapi32
RegQueryValueA
LsaOpenPolicy
LsaClose
LookupAccountNameA
IsValidSid
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
LsaFreeMemory
msvcrt
_except_handler3
_strnicmp
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
strtok
wcscpy
_errno
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_CxxThrowException
rand
putchar
puts
sprintf
strncpy
strchr
malloc
free
_strupr
strrchr
rename
atoi
strncmp
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ