o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\CodesoftPW_Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f18c0acdd9a83abd54c30c65e2df7c38_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f18c0acdd9a83abd54c30c65e2df7c38_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f18c0acdd9a83abd54c30c65e2df7c38_JaffaCakes118
-
Size
409KB
-
MD5
f18c0acdd9a83abd54c30c65e2df7c38
-
SHA1
44385faec31aba8f1b1063be666b0598231ded6f
-
SHA256
59965fe1b10ddbf64532bbc8174f9516f5c31868f0eb01e1da33d6380a2ad3ec
-
SHA512
4f9db50fd69c77e79288120c31436477a7b90e7d117599440f9a581d67777ea3f27361c5bc22c37a3c4eb57321a8aa08234ffed71ace2c8860998597571cb44e
-
SSDEEP
6144:FXxJAcSD3Dty9ZCOfVavfqfS5cNIdVQXc9PUgzdPOKg2mUHClWqA:F3hSDTtyu2Ivz5cN8z5UgzdSpPA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f18c0acdd9a83abd54c30c65e2df7c38_JaffaCakes118
Files
-
f18c0acdd9a83abd54c30c65e2df7c38_JaffaCakes118.exe windows:4 windows x86 arch:x86
818af645faa6026bf77cf04144b6a2f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
lstrcpyA
Sleep
FreeLibrary
LoadLibraryA
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetModuleFileNameA
GetPrivateProfileStringA
GetCurrentProcess
GetFileSize
SetCurrentDirectoryA
LocalAlloc
GetSystemDirectoryA
ExitProcess
lstrcmpA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
CreateMutexA
GetLastError
GetProcAddress
ReadFile
lstrlenA
DeleteFileA
RtlUnwind
RaiseException
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
HeapSize
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
shell32
SHGetFolderPathA
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tr1p0d Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ