Tianyu
Behavioral task
behavioral1
Sample
JaffaCakes118_59f00166ee9570b61b30989bbde94b00.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59f00166ee9570b61b30989bbde94b00.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_59f00166ee9570b61b30989bbde94b00
-
Size
143KB
-
MD5
59f00166ee9570b61b30989bbde94b00
-
SHA1
e17d5ee10855fa44c751b8503a2ef36ebdc619e9
-
SHA256
ddd9a3946479b9e806a55a6f82a667dce2853e35f3d90d34f55ef74a537d640d
-
SHA512
7c546d5b92328b54545a22998608e1b7482e7dfdbe7e5f8c704663d134ed42c85cce335b1ad8ec5c6f88f0a94a7b8b125bfa5e1898878d748af8f6cb6d54a50d
-
SSDEEP
3072:914bUsnUYHF5+fsKHde7q0L/XAtAJ753EG4E4TBftHwsqHxLGgsaXNiYDg:YYN0IAB5Um4TBlDqH5dsSg
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_59f00166ee9570b61b30989bbde94b00
Files
-
JaffaCakes118_59f00166ee9570b61b30989bbde94b00.dll windows:4 windows x86 arch:x86
d6da8dd1279ea7072faee2d2b87ea2c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreatePipe
TerminateProcess
PeekNamedPipe
OutputDebugStringA
GlobalMemoryStatusEx
GetSystemInfo
GetStartupInfoA
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetCurrentThreadId
LocalSize
UnmapViewOfFile
GlobalSize
GlobalAlloc
Beep
GlobalFree
GetVersion
GetCurrentProcess
ExitProcess
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
CreateFileMappingA
RemoveDirectoryA
LocalReAlloc
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
GetPrivateProfileSectionNamesA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
CreateEventA
FreeLibrary
GetLocalTime
GetTickCount
Sleep
CancelIo
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
MapViewOfFile
ExpandEnvironmentStringsA
MoveFileExA
GetSystemDirectoryA
lstrlenA
OpenProcess
WriteProcessMemory
GetFileSize
CreateRemoteThread
VirtualFree
LoadLibraryA
GetProcAddress
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
ReleaseMutex
user32
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
UnhookWindowsHookEx
GetCursorInfo
CallNextHookEx
DestroyCursor
GetActiveWindow
GetWindowTextA
DispatchMessageA
SwapMouseButton
SendMessageA
GetForegroundWindow
GetWindowRect
MoveWindow
FindWindowA
ShowWindow
TranslateMessage
GetMessageA
wsprintfA
CharNextA
ExitWindowsEx
MessageBoxA
GetKeyNameTextA
LoadCursorA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
CreateWindowExA
CloseWindow
IsWindow
ReleaseDC
gdi32
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
advapi32
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
RegisterServiceCtrlHandlerA
GetTokenInformation
RegQueryValueA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
wcstombs
realloc
strncat
_snprintf
wcscpy
_errno
strncmp
atoi
strrchr
_except_handler3
free
malloc
strchr
strncpy
sprintf
rand
strstr
_ftol
ceil
memmove
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strcmpi
winmm
waveInStop
waveOutWrite
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInClose
waveOutReset
waveOutUnprepareHeader
waveInAddBuffer
waveInUnprepareHeader
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveOutClose
ws2_32
ntohs
recv
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
closesocket
select
send
inet_addr
sendto
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
listen
accept
getpeername
bind
getsockname
inet_ntoa
socket
htonl
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
netapi32
NetLocalGroupAddMembers
NetUserAdd
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
avicap32
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ