Behavioral task
behavioral1
Sample
75defac1392f60d1cc5a8eb4e329c87d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75defac1392f60d1cc5a8eb4e329c87d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
75defac1392f60d1cc5a8eb4e329c87d_JaffaCakes118
-
Size
81KB
-
MD5
75defac1392f60d1cc5a8eb4e329c87d
-
SHA1
f4db4b1e54678faf6ef85fe7be338d09b94dd439
-
SHA256
4d34b031aa5752d43de104fc8901fa1acf7ec0239769b42ccf1027b92ae9edf7
-
SHA512
3c4a67782777cadeccb8ba16541ae9f881bff7be3197960f0b8abcb61338983c629651c97c387312f25870c48e9e936d61f8a976c1b81c78b6a140a70b2f7e5a
-
SSDEEP
1536:+THfdAPkI9ulThCvX2XTTVBmCxGXhGKxh9YLAM9tsBBXcq+tf1zeol486LTse9wO:+THf1lThCvX2XThBmCxGXhGKxhOAM9G3
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75defac1392f60d1cc5a8eb4e329c87d_JaffaCakes118
Files
-
75defac1392f60d1cc5a8eb4e329c87d_JaffaCakes118.dll windows:4 windows x86 arch:x86
65d0b74252661a5dee2cf8e197950110
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetProcAddress
LoadLibraryA
CancelIo
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
DisableThreadLibraryCalls
SetThreadPriority
InterlockedExchange
SetEvent
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetPrivateProfileStringA
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ShellExecuteA
shlwapi
PathIsDirectoryA
msvcrt
_adjust_fdiv
??1type_info@@UAE@XZ
calloc
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
printf
rand
srand
time
_beginthreadex
atoi
strchr
strncpy
strcspn
free
malloc
_initterm
ws2_32
socket
ntohs
recv
closesocket
select
send
inet_addr
gethostbyname
sendto
WSASocketA
htonl
gethostname
WSACleanup
WSAStartup
htons
connect
setsockopt
inet_ntoa
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ