Behavioral task
behavioral1
Sample
JaffaCakes118_4fdb53c607d9a1940722b4c340d83228.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4fdb53c607d9a1940722b4c340d83228.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4fdb53c607d9a1940722b4c340d83228
-
Size
607KB
-
MD5
4fdb53c607d9a1940722b4c340d83228
-
SHA1
585ffe06b173698a7518c2204044ff8a473c54bf
-
SHA256
cb6a62372c324df503bacbc8bcece488a977e95f65b972a482788504a46b09b3
-
SHA512
299a299de7b306c4ecec74ae29cb1712cbb3ce1486e323154c5a8329fb866ab0e0a606e3b31d16816a8d2d30400307e9d0fa96e11096779e9189a2abcca6ef94
-
SSDEEP
12288:34ddhJlAghv3r+TsPREfWZRJTUb5XfM5A78HANUTNC:oblAghv3r+TsPREuRlU9fM5AD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4fdb53c607d9a1940722b4c340d83228
Files
-
JaffaCakes118_4fdb53c607d9a1940722b4c340d83228.exe windows:4 windows x86 arch:x86
fc3c69139cf8d8b6f054ba601b7b7e84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
SetFilePointer
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
WriteFile
CloseHandle
CopyFileA
WinExec
GetModuleFileNameA
GlobalAlloc
GlobalLock
lstrcmpA
GlobalUnlock
user32
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
UpdateWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
DestroyCursor
BlockInput
SetThreadDesktop
CloseDesktop
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
PostMessageA
OpenDesktopA
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
DispatchMessageA
TranslateMessage
GetMessageA
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
keybd_event
SystemParametersInfoA
CreateWindowExA
GetCursorPos
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
LsaFreeMemory
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaRetrievePrivateData
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
malloc
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
??1type_info@@UAE@XZ
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveOutClose
waveOutUnprepareHeader
waveInGetNumDevs
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
netapi32
NetLocalGroupAddMembers
NetUserAdd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ