Behavioral task
behavioral1
Sample
45be17b26013601623c2ba7789ffdfff_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45be17b26013601623c2ba7789ffdfff_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
45be17b26013601623c2ba7789ffdfff_JaffaCakes118
-
Size
75KB
-
MD5
45be17b26013601623c2ba7789ffdfff
-
SHA1
bcb01846842f81ddebbf8b5898addb87666d71fb
-
SHA256
d754363344c7b271c0a54bf07e810ddcdc3229f7aab40902459e06d819304a25
-
SHA512
80c15dad43c0a59aeebbb2882a16c176113cf5fe520cdca3eb6232b3cb34e049b8de2e4fcb9b6778fe4cb2d0d052d0e5d6b0bca120b414c9354324b91c208303
-
SSDEEP
1536:dFDMbbMt9ODnjfiwKcuybfLIeEwKJB4AY4eEt8reOv3/DRI:dFIMDODn+wKByrLIeNKJBZ2EtseOv3/1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45be17b26013601623c2ba7789ffdfff_JaffaCakes118
Files
-
45be17b26013601623c2ba7789ffdfff_JaffaCakes118.dll windows:4 windows x86 arch:x86
34be880a9d6a1790ccc81f71a32d59c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
CancelIo
LoadLibraryA
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
CreateThread
DisableThreadLibraryCalls
SetThreadPriority
InterlockedExchange
SetEvent
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetProcAddress
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ShellExecuteA
msvcrt
_initterm
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
printf
_beginthreadex
atoi
rand
strchr
srand
strncpy
strcspn
free
malloc
calloc
??1type_info@@UAE@XZ
_adjust_fdiv
ws2_32
socket
ntohs
recv
closesocket
select
send
inet_addr
gethostbyname
sendto
WSASocketA
htonl
gethostname
WSACleanup
WSAStartup
htons
connect
setsockopt
inet_ntoa
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ