ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3db305cae5799855e5d27e2b57c96560
-
Size
58KB
-
MD5
3db305cae5799855e5d27e2b57c96560
-
SHA1
4745dcc33e7559f5764f70ae59ab71762c24b425
-
SHA256
1346597824f9dcfa5307110ff1d42fd00d30ffa27b485041319f67d0c627055d
-
SHA512
e758ec2f8590e88da828cc7081ae7cc7b24c9f61e78217c400080492d839e286ec27d344d4fe5bc819d1f28ce6ed8fedda3e47b9264be5999a84d0ff5b7c630d
-
SSDEEP
768:evxZt2iHLDS/bo+6mI8GccN9hhtPvVfLUUOFxjM1z4D2DrHxPox:eJZ7SKDcmtVfLUUOFx+qsr2x
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_3db305cae5799855e5d27e2b57c96560
Files
-
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll windows:4 windows x86 arch:x86
5140211937710f5b68ed1b5281e936f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MoveFileA
GetStartupInfoA
DisconnectNamedPipe
TerminateProcess
WriteFile
LocalAlloc
PeekNamedPipe
WaitForMultipleObjects
MoveFileExA
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
GetCurrentThreadId
TerminateThread
GetTickCount
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
LocalFree
SetLastError
GetLastError
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
DeleteFileA
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
InitializeCriticalSection
lstrcatA
lstrlenA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ReleaseMutex
user32
wsprintfA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
advapi32
OpenSCManagerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
shlwapi
SHDeleteKeyA
msvcrt
calloc
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
free
_strcmpi
_beginthreadex
wcstombs
atoi
realloc
strncat
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
strchr
malloc
_except_handler3
strncpy
strrchr
ws2_32
socket
ntohs
recv
closesocket
WSACleanup
send
gethostname
getsockname
htons
connect
setsockopt
select
WSAIoctl
WSAStartup
gethostbyname
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Exports
Exports
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ