ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_5d0660d764bc8130c2698c4eb8c4dae0.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d0660d764bc8130c2698c4eb8c4dae0.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d0660d764bc8130c2698c4eb8c4dae0
-
Size
104KB
-
MD5
5d0660d764bc8130c2698c4eb8c4dae0
-
SHA1
b045cc05ebd6e1b816c81fd7905c6bd4ee88723b
-
SHA256
57d1dfd3a040ac07bb60177c3ee7dbd9e33c47839332d943d2e0c0b17cf9796e
-
SHA512
8cc0466d5893d79ccc0a699ee5a6f1ce8ee2ec1abe30c9ee858dada60b08f7b96c81ff40903bf66e18c61be8417be43e85007335a3268ff87be8c29901d5d021
-
SSDEEP
1536:gQZ5PKHSMDSP5hFa6OCcor3LfhtK/SGVGNYJSym1mEFxY+:g05PMDSRhHOCXr3bhtKXVYYJSyCmEFi+
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_5d0660d764bc8130c2698c4eb8c4dae0
Files
-
JaffaCakes118_5d0660d764bc8130c2698c4eb8c4dae0.dll windows:4 windows x86 arch:x86
f88499f8bb9b53d5511faefda78baa7c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHDeleteKeyA
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
calloc
_beginthreadex
wcstombs
realloc
_strcmpi
strncat
time
srand
rand
atoi
strncpy
strrchr
_except_handler3
malloc
free
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
strchr
winmm
waveOutReset
waveOutUnprepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInClose
waveInUnprepareHeader
waveInStop
waveInReset
waveOutClose
ws2_32
socket
gethostbyname
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
recv
closesocket
select
send
inet_addr
sendto
htonl
ntohs
inet_ntoa
WSAGetLastError
gethostname
getsockname
WSASocketA
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
mfc42
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
kernel32
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
SetErrorMode
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
LocalSize
OpenEventA
ReleaseMutex
GetVersionExA
GlobalMemoryStatusEx
WaitForMultipleObjects
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
UnmapViewOfFile
user32
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
GetCursorInfo
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
wsprintfA
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
SetCapture
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
RegSetValueExA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegisterServiceCtrlHandlerA
OpenProcessToken
SetServiceStatus
FreeSid
shell32
SHGetFileInfoA
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICClose
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICCompressorFree
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ