Behavioral task
behavioral1
Sample
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_41909ca1041688fc4e164f49ac49f671
-
Size
36KB
-
MD5
41909ca1041688fc4e164f49ac49f671
-
SHA1
3f960dffb882bfa6fb72df3ef75ea286dc798c63
-
SHA256
0bbf4cf0a14dca38afbdbf864c69c14903c5c8a49269d397623695134fb6f315
-
SHA512
c0a6c006a97c79a570cc01fc88cc50590cfd2d63a609d981df99c6429efae42ca91b0ba7a0cdf2ac2feb732e84c4238ac999e02c8e4fea64a396b97e4f702e49
-
SSDEEP
384:2fksDfZr0jpT2VDcUHVkuGLCyrMZwKjUOatTwMSp9Cpv9uGXO:2fkMr0ROPpGLCyAZwsUdw7SYGX
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_41909ca1041688fc4e164f49ac49f671
Files
-
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll windows:4 windows x86 arch:x86
3378dc62dedee9eb75f40583131a9755
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcatW
lstrcpyW
DeleteFileW
FreeLibrary
CopyFileW
GetTempFileNameW
FindClose
FindNextFileW
FindFirstFileW
CreateDirectoryW
GetProcAddress
LoadLibraryW
GetFileAttributesW
lstrlenW
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileW
GetVolumeInformationW
GetSystemDirectoryW
lstrcmpiW
GlobalMemoryStatus
GetVersionExW
DeleteFileA
GetTempPathA
LoadLibraryA
WideCharToMultiByte
ExitProcess
GetTickCount
OpenEventW
SetErrorMode
TerminateThread
GetTempPathW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Sleep
CancelIo
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventW
InterlockedExchange
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
MultiByteToWideChar
InitializeCriticalSection
user32
wsprintfW
advapi32
GetUserNameW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
msvcrt
free
_initterm
malloc
_adjust_fdiv
_wcsicmp
??1type_info@@UAE@XZ
ftell
fclose
fwrite
fseek
fopen
sprintf
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
wcscpy
_beginthreadex
??2@YAPAXI@Z
_CxxThrowException
rand
srand
time
swprintf
wcscat
wcscmp
atoi
wcsncpy
fread
wcslen
strncpy
ws2_32
WSACleanup
WSAIoctl
WSAStartup
connect
htons
gethostbyname
socket
closesocket
select
recv
send
gethostname
getsockname
setsockopt
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ