ServiceMain
Behavioral task
behavioral1
Sample
4dc6c6134cbf154d360ccb6ee31e5fb9_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4dc6c6134cbf154d360ccb6ee31e5fb9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4dc6c6134cbf154d360ccb6ee31e5fb9_JaffaCakes118
-
Size
98KB
-
MD5
4dc6c6134cbf154d360ccb6ee31e5fb9
-
SHA1
ff3970ae4d58c91a71b2d37213da445814424470
-
SHA256
b868696926ebbdcf6490bef3899d273c731e377f975f7248b6f410bfe10c272f
-
SHA512
aef54a7abe924703037b59f54faaa332ee0198d5f1754fbc911404e264610443e541c35d86db6adffa06cf118167bea2dba79144476108d7e2466d73c1ba5999
-
SSDEEP
1536:GshI9zSBPap92ZXH5xMOHcgm6fdbcp+8A2+UhA2B33qR2:ThrPapUtZxMOHLm8dbcsZ2V9BnqI
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dc6c6134cbf154d360ccb6ee31e5fb9_JaffaCakes118
Files
-
4dc6c6134cbf154d360ccb6ee31e5fb9_JaffaCakes118.dll windows:4 windows x86 arch:x86
7a4a2aed739604a39a827169dbfff21a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
MoveFileExA
GetTickCount
GetModuleFileNameA
SetLastError
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetSystemDirectoryA
GetLocalTime
Process32Next
Process32First
CreateToolhelp32Snapshot
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatusEx
GetSystemInfo
GetComputerNameA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
GetCurrentThreadId
RaiseException
msvcrt
strncpy
strncat
realloc
atoi
wcstombs
_beginthreadex
strrchr
_initterm
_adjust_fdiv
??3@YAXPAX@Z
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
calloc
_strnicmp
_strupr
??2@YAPAXI@Z
_strcmpi
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
msvfw32
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICOpen
Exports
Exports
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ