CpyCommon
Behavioral task
behavioral1
Sample
5e649158920f0186f332107a39930065_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
5e649158920f0186f332107a39930065_JaffaCakes118
-
Size
153KB
-
MD5
5e649158920f0186f332107a39930065
-
SHA1
e60c0f52ba472a0c0330266d0306722fa27ba783
-
SHA256
edc1c70d42003be0c2ba4f878719436f3a5df9837b30874ab610a01c96f3704a
-
SHA512
91f8cf6c7adb3be9c8c2fc6a696dadb2f57c1b9b829dd3a600ba2dc988e55e21a138c8c9321e38a73da22d0369f23467cf909c533499c638a136efdede7fdb44
-
SSDEEP
3072:mTxbg5yT5gPvjIHIv/Px7x1SA0QNNTBftfyk95O69:zzrIHI3PxNN0wNTBlfyk9D
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e649158920f0186f332107a39930065_JaffaCakes118
Files
-
5e649158920f0186f332107a39930065_JaffaCakes118.dll windows:4 windows x86 arch:x86
d77a35338f2bcc7a1a816bbe14a355ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
lstrcmpiA
Sleep
LocalFree
LocalSize
LocalAlloc
LocalReAlloc
GetLastError
GetCurrentProcess
VirtualQuery
GetProcAddress
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
lstrcmpA
GetTickCount
VirtualProtect
lstrcatA
GetSystemDirectoryA
MultiByteToWideChar
SetEnvironmentVariableA
GetTempPathA
GetLongPathNameA
GetModuleFileNameA
InterlockedExchange
FreeLibrary
SetUnhandledExceptionFilter
GetLocalTime
FormatMessageA
IsBadWritePtr
InitializeCriticalSection
LeaveCriticalSection
lstrcpyA
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetSystemInfo
GetVersionExA
GetProcessTimes
GlobalMemoryStatusEx
GlobalFree
GlobalAlloc
GetTempFileNameA
DeleteFileA
RemoveDirectoryA
ExitThread
IsBadReadPtr
IsBadStringPtrW
InterlockedDecrement
InterlockedIncrement
ExitProcess
GetExitCodeProcess
WideCharToMultiByte
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
ExpandEnvironmentStringsA
GlobalUnlock
GlobalLock
GlobalSize
MapViewOfFile
CreateFileMappingA
GetShortPathNameA
VirtualFree
lstrlenA
RaiseException
LoadLibraryA
advapi32
RegOpenKeyExW
user32
DestroyWindow
CreateWindowExA
MessageBoxA
CloseWindowStation
GetCursorInfo
DestroyCursor
LoadCursorA
wvsprintfA
wsprintfA
GetWindowRect
ShowWindow
GetClassNameA
GetWindow
msvcrt
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_strupr
_memicmp
_wcsicmp
_strlwr
_beginthreadex
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
realloc
malloc
strstr
free
srand
rand
_ftol
strchr
strncat
_except_handler3
wcsrchr
strncpy
_CxxThrowException
memmove
ceil
atoi
wcstombs
strrchr
wcslen
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ