ServiceMain
Behavioral task
behavioral1
Sample
dd841843b02feb9ba46b63e0be17d06f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd841843b02feb9ba46b63e0be17d06f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dd841843b02feb9ba46b63e0be17d06f_JaffaCakes118
-
Size
82KB
-
MD5
dd841843b02feb9ba46b63e0be17d06f
-
SHA1
05798ac017f2f6a01ecd0a64ce901ad4de267676
-
SHA256
2e25e225fef44e4b1ccd8160146081804e849b2e28fa95df1e1fedf020bb419a
-
SHA512
0399bd3a6a601aaa3cc534e2659e4cdce08fc1b20cb2320e8ef0ad03675b3b7997b8399f88028dac86a8400aab56e531d80b186892174f8172bda8ec06295c17
-
SSDEEP
1536:uwpovcHDAnQVNrdscEd5GfiMu3NhmWp4dX:ueovc9rdsPd5wiMudhmWp4dX
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd841843b02feb9ba46b63e0be17d06f_JaffaCakes118
Files
-
dd841843b02feb9ba46b63e0be17d06f_JaffaCakes118.dll windows:4 windows x86 arch:x86
43275f99011911ef6fd482ff791830eb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
GetSystemDirectoryA
GetFileAttributesA
GetTempPathA
TerminateThread
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
MoveFileA
PeekNamedPipe
WaitForMultipleObjects
ReleaseMutex
OpenEventA
SetErrorMode
OutputDebugStringA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
GetCurrentThreadId
CreateFileA
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
ReadFile
WriteFile
SetFilePointer
TerminateProcess
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
lstrcpyA
ResetEvent
InitializeCriticalSection
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
CreateProcessA
GetDriveTypeA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
user32
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
CreateWindowExA
ExitWindowsEx
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
GetWindowThreadProcessId
CloseWindow
EnumWindows
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
SetWindowsHookExA
IsWindow
UnhookWindowsHookEx
SystemParametersInfoA
SendMessageA
keybd_event
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
gdi32
DeleteObject
CreateDIBSection
SelectObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
CreateCompatibleDC
advapi32
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
strncpy
realloc
atoi
wcstombs
_beginthreadex
calloc
_except_handler3
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
malloc
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
_strcmpi
free
ceil
memmove
??3@YAXPAX@Z
ws2_32
WSACleanup
htons
WSAStartup
setsockopt
send
socket
gethostname
getsockname
connect
ntohs
recv
select
closesocket
gethostbyname
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
dbghelp
MakeSureDirectoryPathExists
imm32
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Exports
Exports
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ