ServiceMain
Behavioral task
behavioral1
Sample
d20ae4c552b142206d74c932ff27eb20_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d20ae4c552b142206d74c932ff27eb20_JaffaCakes118
-
Size
103KB
-
MD5
d20ae4c552b142206d74c932ff27eb20
-
SHA1
e9c77b10bbce790df9eb36d8dbbefa1bb33cd68c
-
SHA256
3345f260e65ca4b9147c5a8670bf5f89e566cbeb811d045fb5e7941285d62af2
-
SHA512
b2780818b346eb0165ec5453dade3ccf5f772a3d69be00c78f7de638a5a426f9c51fd9a9660617cf3d005a36610ad5ff7c6f692f694610ee600e4efb5f31f215
-
SSDEEP
1536:MMHM/6PFlDCp5FvrrPMoSPQicTROfESKOcNfwIne:MqwQSp5Fvrr0bQiIRIESKBfwIne
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d20ae4c552b142206d74c932ff27eb20_JaffaCakes118
Files
-
d20ae4c552b142206d74c932ff27eb20_JaffaCakes118.dll windows:4 windows x86 arch:x86
f3105473b3055f801d29c21dddc379a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GetTickCount
GetSystemDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
TerminateProcess
PeekNamedPipe
GetStartupInfoA
CreatePipe
GetLocalTime
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
WriteFile
MoveFileExA
GetProcAddress
CreateEventA
OpenProcess
GetCurrentProcess
lstrcmpiA
GetModuleFileNameA
Sleep
MoveFileA
SetFilePointer
ReadFile
CreateFileA
GetFileSize
LocalAlloc
RemoveDirectoryA
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
lstrlenA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
InterlockedExchange
lstrcpyA
CancelIo
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
LoadLibraryA
DisconnectNamedPipe
user32
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
EnumWindows
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
CloseDesktop
OpenInputDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
GetDC
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
CharNextA
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
advapi32
AllocateAndInitializeSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
LsaFreeMemory
IsValidSid
LsaClose
LookupAccountNameA
LsaRetrievePrivateData
LsaOpenPolicy
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
GetLengthSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
PathFileExistsA
msvcrt
_except_handler3
strrchr
strncpy
strncat
realloc
atoi
free
_beginthreadex
calloc
_initterm
_adjust_fdiv
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
wcstombs
_strnicmp
ws2_32
gethostname
getsockname
recv
send
ntohs
gethostbyname
connect
WSAIoctl
WSACleanup
WSAStartup
htons
select
socket
closesocket
setsockopt
msvcp60
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
msvfw32
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Exports
Exports
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ