Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_618b0a79ca06fb09f3cfc41af52a1aac.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_618b0a79ca06fb09f3cfc41af52a1aac.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_618b0a79ca06fb09f3cfc41af52a1aac
-
Size
125KB
-
MD5
618b0a79ca06fb09f3cfc41af52a1aac
-
SHA1
ef49c18456e9c9328fa650ff35c6943cb34f44c5
-
SHA256
ff60a07130064fdbf4121e43c676a91e3628fb37bdc1c002da8296e4eb36a24e
-
SHA512
1d8ec735e07441ff9686e279cbd63e6520a229fcecb53453a037ab17cdf21ae00cac8b58b4a9faf7e72a7ed3f4edae8bc642342200819d14c9fda92ae2c8c3c5
-
SSDEEP
3072:M/eq6y3r2OU9cYUwOpHcr4WvWxrCCsYGaZ9yWJZP:M/eq6y3KOUKpwOpHfJxGiGayWv
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_618b0a79ca06fb09f3cfc41af52a1aac
Files
-
JaffaCakes118_618b0a79ca06fb09f3cfc41af52a1aac.exe windows:4 windows x86 arch:x86
5471366a6bc9341f1ec7171e5403407c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrcmpiA
SetLastError
ReadFile
SetFilePointer
WideCharToMultiByte
FreeResource
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
LoadResource
Sleep
ReleaseMutex
CreateMutexA
GetCommandLineA
WinExec
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
SetFileTime
SizeofResource
lstrlenA
MoveFileA
MultiByteToWideChar
GetVersion
CreateRemoteThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
GetProcAddress
Process32Next
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
GetTempPathA
GetWindowsDirectoryA
FreeLibrary
LoadLibraryA
SetUnhandledExceptionFilter
user32
wsprintfA
PostThreadMessageA
GetInputState
GetMessageA
advapi32
GetSecurityDescriptorDacl
ChangeServiceConfigA
UnlockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
CreateServiceA
GetUserNameA
LockServiceDatabase
msvcrt
_acmdln
_strlwr
_strnset
_except_handler3
realloc
malloc
strchr
strtok
??3@YAXPAX@Z
strncmp
strtoul
isdigit
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_stricmp
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strrev
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
freesoft Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
. Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ