myServiceMain
Behavioral task
behavioral1
Sample
ade19b4b02694c19a9ace47695f19ac8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ade19b4b02694c19a9ace47695f19ac8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ade19b4b02694c19a9ace47695f19ac8_JaffaCakes118
-
Size
113KB
-
MD5
ade19b4b02694c19a9ace47695f19ac8
-
SHA1
c357cc126c03032c6dffdc5eda8daff512159bf9
-
SHA256
0fd2a6c1252d1c82abe60bd315fe7f8620f7d0ea0497a819d26c1e9d6b2ccf79
-
SHA512
67bff6b883aa33a7b0d11583f6e0fb71cd32cf81c418e8591ddcf083cc38370a024124bc0f2a9f08885dc242704d80fc3a1fcc869ec2fe2953dda7570e4022ae
-
SSDEEP
3072:teC+p4ZtRgT9oscNbcGuI1tIr5ev75BKO0f:0CBZsTctDv/L75BKZf
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ade19b4b02694c19a9ace47695f19ac8_JaffaCakes118
Files
-
ade19b4b02694c19a9ace47695f19ac8_JaffaCakes118.dll windows:4 windows x86 arch:x86
13c962db69685bdbd83a274379764393
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHDeleteKeyA
msvcrt
_strrev
_strcmpi
_initterm
_onexit
__dllonexit
calloc
_beginthreadex
wcstombs
realloc
strchr
strncat
printf
time
srand
rand
_errno
sprintf
strncmp
atoi
strncpy
strrchr
_except_handler3
malloc
free
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
_adjust_fdiv
winmm
waveInClose
waveOutReset
waveOutUnprepareHeader
waveInUnprepareHeader
waveInReset
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveOutWrite
waveOutClose
ws2_32
closesocket
WSAStartup
WSACleanup
recv
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
send
inet_ntoa
inet_addr
getsockname
bind
sendto
__WSAFDIsSet
ntohs
htonl
WSASocketA
WSAGetLastError
gethostname
select
recvfrom
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
mfc42
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
kernel32
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
TerminateProcess
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
CreateMutexA
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
MapViewOfFile
HeapFree
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetVersionExA
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetProcessHeap
user32
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetThreadDesktop
GetUserObjectInformationA
OpenDesktopA
PostMessageA
CreateWindowExA
GetDC
IsWindow
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
ExitWindowsEx
wsprintfA
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
SendMessageA
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
CloseWindow
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
OpenServiceA
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
GetLengthSid
AddAccessAllowedAce
InitializeAcl
AllocateAndInitializeSid
shell32
SHGetFileInfoA
imm32
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICClose
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICCompressorFree
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ