CpyCommon
Behavioral task
behavioral1
Sample
8d46b613e9b02a28d0bbd990ac5a41c6_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
8d46b613e9b02a28d0bbd990ac5a41c6_JaffaCakes118
-
Size
152KB
-
MD5
8d46b613e9b02a28d0bbd990ac5a41c6
-
SHA1
decae7b2b612b6198211d574764119d56477d131
-
SHA256
c31010a6fabfe195ef354f6f8a94d4340ad2c5b79906ca7345f23078932ac7f2
-
SHA512
85faa2c5a1506b08c4ce9bad7b55b78c1e15a4ea8620ea48826388804bfbbb35183adca75db39beadc5a6a39374813086b9883d1bd60d4589bfd4d891e774e87
-
SSDEEP
3072:B7+0gaBhkeZ+E6ne8nRU0DJh8Vrc8RTBft08yzHvdlA:BhEi+ZzO0tyV1RTBl08yzHvc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d46b613e9b02a28d0bbd990ac5a41c6_JaffaCakes118
Files
-
8d46b613e9b02a28d0bbd990ac5a41c6_JaffaCakes118.dll windows:4 windows x86 arch:x86
9c937fb17c66c2b3cbdd9c49ad3fa3a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
lstrcmpiA
GetTickCount
ExitProcess
lstrcatA
GetSystemDirectoryA
Sleep
GetExitCodeProcess
GetLastError
InterlockedExchange
GetModuleFileNameA
SetUnhandledExceptionFilter
GetLocalTime
FormatMessageA
GetModuleHandleA
VirtualQuery
IsBadWritePtr
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
ExpandEnvironmentStringsA
LocalFree
LocalReAlloc
LocalAlloc
GetProcAddress
LocalSize
GetSystemInfo
GetVersionExA
GetProcessTimes
GetCurrentProcess
GlobalMemoryStatusEx
FreeLibrary
GlobalFree
lstrcpyA
GetTempFileNameA
DeleteFileA
RemoveDirectoryA
ExitThread
FreeLibraryAndExitThread
IsBadReadPtr
IsBadStringPtrW
GetCurrentThreadId
InitializeCriticalSection
VirtualFree
LeaveCriticalSection
VirtualAlloc
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
lstrcmpA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GlobalUnlock
GlobalLock
GlobalSize
MapViewOfFile
CreateFileMappingA
SuspendThread
ResumeThread
Thread32Next
OpenThread
Thread32First
GetCurrentProcessId
SetEnvironmentVariableA
GetTempPathA
GetLongPathNameA
RaiseException
GlobalAlloc
lstrlenA
LoadLibraryA
user32
LoadCursorA
DestroyCursor
ShowWindow
FindWindowA
GetWindow
GetClassNameA
BlockInput
MessageBoxA
CloseWindowStation
DestroyWindow
CreateWindowExA
wvsprintfA
wsprintfA
GetCursorInfo
advapi32
RegOpenKeyExW
msvfw32
ICGetInfo
msvcrt
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_itoa
_strlwr
_wcsicmp
_memicmp
_strupr
_CxxThrowException
tolower
toupper
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
free
malloc
_except_handler3
strchr
strncat
wcslen
strstr
strrchr
rand
srand
_ftol
atoi
wcstombs
_beginthreadex
memmove
ceil
wcsrchr
realloc
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ