ServiceMain
Behavioral task
behavioral1
Sample
67f9cf7ab881680027f4177b14b31618_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67f9cf7ab881680027f4177b14b31618_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
67f9cf7ab881680027f4177b14b31618_JaffaCakes118
-
Size
86KB
-
MD5
67f9cf7ab881680027f4177b14b31618
-
SHA1
059e3644867e640b47f57a02d811cb722e5b8803
-
SHA256
4ab29ace2bbfd7a2898b45d13fd507683d2bd1e7d04bac17c6477b35f4f71934
-
SHA512
b0346fcba524e5c801c982bd703d769b7e00d35895d102d005acbfca54a22c3a9d6866dcdf7559bd1f73cf1db53fca5f2df13ea233b829ea376fdcb5c867bc34
-
SSDEEP
1536:VzZWt5TKl5QO+QHIVcK3cfRBeZs4i6v4Rvc+Xp:V9sKAzQHIVR3+RBei6ARvc+Xp
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67f9cf7ab881680027f4177b14b31618_JaffaCakes118
Files
-
67f9cf7ab881680027f4177b14b31618_JaffaCakes118.dll windows:4 windows x86 arch:x86
7bfb4db491d89ff252512e53039bb167
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenProcess
TerminateThread
GetTickCount
GetWindowsDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
OutputDebugStringA
GetTempPathA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
CreateThread
GetCurrentProcess
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
PeekNamedPipe
InitializeCriticalSection
user32
GetLastInputInfo
DispatchMessageA
TranslateMessage
CreateWindowExA
RegisterClassA
LoadIconA
LoadCursorA
SendMessageA
PostQuitMessage
DefWindowProcA
PostMessageA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
GetMessageA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
GetThreadDesktop
UpdateWindow
MapVirtualKeyA
ShowWindow
CharNextA
wsprintfA
OpenDesktopA
OpenInputDesktop
SetThreadDesktop
GetUserObjectInformationA
CloseDesktop
EnumWindows
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
GetProcessWindowStation
OpenWindowStationA
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetStockObject
SelectObject
advapi32
AdjustTokenPrivileges
RegEnumKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
shell32
SHGetFileInfoA
msvcrt
fclose
_strnicmp
_adjust_fdiv
_initterm
calloc
_snprintf
_beginthreadex
fopen
fwrite
_strcmpi
wcstombs
realloc
strchr
strncat
sprintf
strncmp
atoi
strncpy
strrchr
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
ws2_32
getpeername
WSAAsyncGetHostByName
WSARecv
recvfrom
WSAGetLastError
accept
gethostname
ioctlsocket
__WSAFDIsSet
WSASend
WSAAsyncSelect
htonl
bind
listen
send
select
recv
ntohs
socket
gethostbyname
sendto
getsockname
inet_addr
inet_ntoa
WSAConnect
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
closesocket
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capGetDriverDescriptionA
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ