ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_4018a0d68ab63a2bd4fbc4eead8765cc.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4018a0d68ab63a2bd4fbc4eead8765cc
-
Size
101KB
-
MD5
4018a0d68ab63a2bd4fbc4eead8765cc
-
SHA1
28cfbe94a31d78a39218f2e1a1095e099f9d116d
-
SHA256
2e7dcbfe08c7122f0475af81f5db326d61aded25b621cf535c8dca63bcbeb16a
-
SHA512
46fb262aecab789d72273f4af3e1781aadd483c54a961b01e72631cfd238031e82c2e42285fd0937a60a4442d115a9d10318b1132494b6b7797b8c5219931b80
-
SSDEEP
3072:fEk69GRaQx846bWiaHSY4Hj6qBzM+rmPH:fEk60aQx81W9eHeAM+6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4018a0d68ab63a2bd4fbc4eead8765cc
Files
-
JaffaCakes118_4018a0d68ab63a2bd4fbc4eead8765cc.dll windows:4 windows x86 arch:x86
1b3bf16b0af89331a57fdf1bd6c9cb5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
CreateProcessA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
ExpandEnvironmentStringsA
GetProcessHeap
GlobalMemoryStatus
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetLocalTime
MoveFileExA
OpenProcess
HeapFree
DeviceIoControl
GetTickCount
VirtualAllocEx
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
Sleep
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
LocalAlloc
FindFirstFileA
RemoveDirectoryA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
MultiByteToWideChar
GetWindowsDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
lstrcpyA
InterlockedExchange
SetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
FreeLibrary
CreateThread
ResumeThread
WaitForSingleObject
TerminateThread
CloseHandle
CreateEventA
LoadLibraryA
WaitForMultipleObjects
GetProcAddress
user32
SetCapture
WindowFromPoint
SetCursorPos
MapVirtualKeyA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
mouse_event
GetSystemMetrics
SendMessageA
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
IsWindow
CloseWindow
CreateWindowExA
SystemParametersInfoA
BlockInput
DestroyCursor
keybd_event
DispatchMessageA
LoadCursorA
SetRect
UnhookWindowsHookEx
GetWindowTextA
GetActiveWindow
GetClipboardData
GetKeyNameTextA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
ExitWindowsEx
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetProcessWindowStation
GetWindowThreadProcessId
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
CreateCompatibleBitmap
GetDIBits
advapi32
RegOpenKeyA
RegDeleteValueA
RegEnumKeyExA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
IsValidSid
LsaClose
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_strrev
_strnicmp
_strnset
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveInStop
waveInStart
waveInAddBuffer
waveInReset
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInClose
waveOutClose
waveOutUnprepareHeader
waveInPrepareHeader
waveOutReset
waveOutOpen
waveOutGetNumDevs
ws2_32
WSAStartup
WSAIoctl
connect
htons
gethostbyname
socket
recv
closesocket
select
send
gethostname
getsockname
WSACleanup
setsockopt
msvcp60
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
imm32
ImmReleaseContext
ImmGetContext
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ