ServiceMain
Behavioral task
behavioral1
Sample
86e154c219f1644241bd2aea5a97d3f9_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
86e154c219f1644241bd2aea5a97d3f9_JaffaCakes118
-
Size
140KB
-
MD5
86e154c219f1644241bd2aea5a97d3f9
-
SHA1
5143369fb8b9741536a2a4dbff24603d44878d7d
-
SHA256
74586006b5e2fb49689744043dc8d8c1e9edecb6dc4044a2206c8c357b8d2775
-
SHA512
391985afb623e9475d1a6a9bec845cf92e7f1aacd7904ca24eaa1cc3be3ae1dc6e8955e4e89917ea76bae75c1e8f586901f9f597f82ab7ba611f22b9faa9faea
-
SSDEEP
3072:1PYYTfldsz4XfOUJ6suMiHgs8xwburoDbnoHo1YSCTMLKZ/H4wZMZ:1PYKnsVHgs82iroD8/SgE8/H4wZMZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86e154c219f1644241bd2aea5a97d3f9_JaffaCakes118
Files
-
86e154c219f1644241bd2aea5a97d3f9_JaffaCakes118.dll windows:4 windows x86 arch:x86
d58429b704d90d853aba54160f5925dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
LoadLibraryA
FreeLibrary
CloseHandle
Sleep
SetEvent
CreateThread
ResetEvent
GetTickCount
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
FindFirstFileA
LocalAlloc
SetFilePointer
MoveFileA
lstrcatA
lstrcmpiA
CreateToolhelp32Snapshot
HeapFree
VirtualAlloc
GlobalUnlock
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetSystemInfo
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
CopyFileA
CreateFileA
user32
wsprintfA
SendMessageA
EmptyClipboard
OpenClipboard
CloseClipboard
GetSystemMetrics
SetRect
ReleaseDC
IsWindow
CreateWindowExA
LoadCursorA
GetMessageA
msvcrt
_stricmp
_strrev
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
puts
memmove
ceil
_ftol
strstr
rand
sprintf
strncpy
free
malloc
_except_handler3
strrchr
strncat
strchr
_beginthreadex
atoi
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
__dllonexit
_onexit
_strnicmp
ws2_32
WSASocketA
sendto
getsockname
connect
inet_addr
send
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
htonl
WSAStartup
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ