DynamicMain
Behavioral task
behavioral1
Sample
40db64be5b36e8514738c877bdceb16e_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
40db64be5b36e8514738c877bdceb16e_JaffaCakes118
-
Size
152KB
-
MD5
40db64be5b36e8514738c877bdceb16e
-
SHA1
463da0c1ebd328cc5ba388b2a0181930a212a37b
-
SHA256
032d003ddc129dfbe45ad6a584b7f5d7cb88f9d8de33ce2a8486dbbcfcf82913
-
SHA512
f5d3dc1708975e4086ac463d592126b48b40699f1fd8b552acc060b98f605f0dc043be58f9206f990a201ab2a68a486a15ec994789709bd0d50bd40666c18751
-
SSDEEP
3072:nom7uqYGfhgxTSKvM/MSGCKpbI986EgzCpTBftrzwXhXmaOy:H91gxuKUQCKpMflzCpTBlrI
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40db64be5b36e8514738c877bdceb16e_JaffaCakes118
Files
-
40db64be5b36e8514738c877bdceb16e_JaffaCakes118.dll windows:4 windows x86 arch:x86
9f95ec591d58947c6d4e7444da527d6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ole32
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
kernel32
RaiseException
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
ExpandEnvironmentStringsA
GetLastError
lstrcpyA
lstrlenA
CloseHandle
lstrcatA
LocalFree
LocalReAlloc
LocalAlloc
GetProcAddress
GetModuleHandleA
GetTickCount
GetLocalTime
GlobalUnlock
GlobalLock
GlobalSize
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetShortPathNameA
HeapAlloc
lstrcmpiA
Sleep
GetVersionExA
GetCurrentThreadId
InitializeCriticalSection
InterlockedExchange
LeaveCriticalSection
VirtualQuery
GetCurrentProcessId
lstrcmpA
VirtualProtect
GetSystemDirectoryA
MultiByteToWideChar
SetEnvironmentVariableA
GetTempPathA
GetLongPathNameA
GetModuleFileNameA
LocalSize
GetCurrentProcess
ExitProcess
GetExitCodeProcess
GetSystemInfo
GetProcessTimes
GlobalMemoryStatusEx
FreeLibrary
GlobalFree
GlobalAlloc
GetTempFileNameA
DeleteFileA
RemoveDirectoryA
ExitThread
IsBadReadPtr
IsBadStringPtrW
LoadLibraryA
VirtualFree
VirtualAlloc
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
FormatMessageA
IsBadWritePtr
WideCharToMultiByte
user32
DestroyCursor
GetClassNameA
DestroyWindow
CreateWindowExA
MessageBoxA
wvsprintfA
CloseWindowStation
GetCursorInfo
GetWindow
LoadCursorA
GetWindowRect
ShowWindow
wsprintfA
advapi32
RegOpenKeyExW
msvcrt
??2@YAPAXI@Z
rand
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_memicmp
_wcsicmp
_strlwr
_strupr
wcslen
ceil
memmove
wcsrchr
strncat
wcstombs
__CxxFrameHandler
??3@YAXPAX@Z
free
malloc
_except_handler3
strstr
strrchr
strchr
srand
_beginthreadex
strncpy
_CxxThrowException
_ftol
realloc
atoi
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ