ServiceMain
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_6301e55b7e8cfbcda6d4d6dce4c50a40.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6301e55b7e8cfbcda6d4d6dce4c50a40
-
Size
124KB
-
MD5
6301e55b7e8cfbcda6d4d6dce4c50a40
-
SHA1
b2bd214e0a84bb34b817d7d5a31dcca74d2684f8
-
SHA256
d00e06f0534764778c23a5f31d2306307028267f0418ac977a4a8a2d5cf89629
-
SHA512
a25c1eafae7247b67bf7999bd675147de0c1d8ac3f122943164405779a6cb5e10d6cf9d02898af934c34a41fccbc0d6cad32ffbd158e5f5d5bcd859e9d1598ad
-
SSDEEP
3072:o6PUTJTnPvtRyt3V8IblckjxO02Anbm+ua/:xPAJTnPvtaukjqKmRA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6301e55b7e8cfbcda6d4d6dce4c50a40
Files
-
JaffaCakes118_6301e55b7e8cfbcda6d4d6dce4c50a40.dll windows:4 windows x86 arch:x86
d2f813fcd3d3c2436aa3dc88c351ae08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHDeleteKeyA
msvcrt
_strcmpi
_initterm
_onexit
__dllonexit
calloc
_beginthreadex
wcstombs
realloc
strncat
_errno
strncmp
printf
time
srand
rand
strchr
wcscpy
atoi
strncpy
strrchr
_except_handler3
malloc
free
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
_adjust_fdiv
winmm
waveOutReset
waveOutUnprepareHeader
waveInReset
waveInClose
waveInUnprepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveOutClose
ws2_32
select
inet_addr
sendto
closesocket
recv
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
ntohs
htonl
WSASocketA
inet_ntoa
bind
getpeername
accept
listen
send
recvfrom
__WSAFDIsSet
WSAGetLastError
gethostname
getsockname
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
mfc42
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
kernel32
WaitForMultipleObjects
OutputDebugStringA
DeviceIoControl
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
PeekNamedPipe
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
SetErrorMode
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LocalSize
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
GetProcessHeap
HeapFree
ExpandEnvironmentStringsA
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
MultiByteToWideChar
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetVersionExA
MapViewOfFile
user32
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
ExitWindowsEx
wsprintfA
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SystemParametersInfoA
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
IsWindow
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
QueryServiceStatus
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
SetServiceStatus
GetLengthSid
shell32
SHGetFileInfoA
netapi32
NetUserAdd
NetLocalGroupAddMembers
imm32
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICOpen
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSendMessage
ICSeqCompressFrame
ICSeqCompressFrameStart
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
Sections
PAGO Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ