ServiceMain
Behavioral task
behavioral1
Sample
35881dff2b342119e5a31144e3e9dc58_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35881dff2b342119e5a31144e3e9dc58_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
35881dff2b342119e5a31144e3e9dc58_JaffaCakes118
-
Size
124KB
-
MD5
35881dff2b342119e5a31144e3e9dc58
-
SHA1
1cb8df8448fe278d55a47cf8aa14437fb568e43c
-
SHA256
a71e5a370dad1eaf286cc78dafdbba11b3a9d10e2a47c8839be793e861325aa9
-
SHA512
48c662622d89ba07280cdc6ef0eff686849558c02510c01f2401532c24f56d2a576bbfe8338eb00ea6cc83fae4dbbe4efee8f51cc1d7ee98a2a01d3023a12bc6
-
SSDEEP
3072:H3Ih1i3asSoofMIiiLg9cO5d2Ml2cd4UGAhf:XIh1SUfMIiiMx5kG2cd4D
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35881dff2b342119e5a31144e3e9dc58_JaffaCakes118
Files
-
35881dff2b342119e5a31144e3e9dc58_JaffaCakes118.dll windows:4 windows x86 arch:x86
65abf3460184c1ad609b721ddfba504e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
GetProcAddress
LoadLibraryA
Sleep
GetFileAttributesA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
GetLastError
CreateDirectoryA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
TerminateThread
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
ExitProcess
GetCurrentProcess
GetVersion
DeviceIoControl
Beep
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetTickCount
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalLock
GlobalAlloc
OutputDebugStringA
GetStartupInfoA
CreatePipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
CreateMutexA
RaiseException
CloseHandle
CreateFileA
CreateEventA
msvcrt
_errno
wcscpy
_snprintf
strncat
realloc
wcstombs
_beginthreadex
calloc
strchr
_adjust_fdiv
_strnicmp
_strcmpi
_stricmp
_strrev
strncmp
atoi
strncpy
strrchr
malloc
free
_except_handler3
strstr
_ftol
_initterm
ceil
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
userenv
CreateEnvironmentBlock
GetUserProfileDirectoryA
GetProfilesDirectoryA
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
netapi32
NetUserAdd
NetLocalGroupAddMembers
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Exports
Exports
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ