o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\CryNex Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
187329382ac35f31149f0c705c1a1440_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
187329382ac35f31149f0c705c1a1440_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
187329382ac35f31149f0c705c1a1440_JaffaCakes118
-
Size
550KB
-
MD5
187329382ac35f31149f0c705c1a1440
-
SHA1
a2915b984c42552fb0563d75cd10afa16f249b67
-
SHA256
ea5175958facb1561babc8ebf96b960bf9cd655168c1563383a3046b1c07a69f
-
SHA512
fdfa602287219b576e6efcc68b3d93a328febb2b68965d242937e7bd80076a4166f4c34cc416414c481641b0c970ec93b0d32279e66685bd453161769ba3e1eb
-
SSDEEP
12288:aBJER0IQhSjTtyu2IvT5cNcziczDSV19tM76WitarrbL:aTERbzaHczic2Ltdxarr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 187329382ac35f31149f0c705c1a1440_JaffaCakes118
Files
-
187329382ac35f31149f0c705c1a1440_JaffaCakes118.exe windows:4 windows x86 arch:x86
1e3c3f03eddf8e2d92a8c391dc05cb52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
LocalFree
lstrcpyA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
VirtualAlloc
GetComputerNameA
CloseHandle
lstrcmpA
GetSystemDirectoryA
CreateToolhelp32Snapshot
Module32Next
CreateFileA
Process32Next
Module32First
Process32First
GetFileSize
ReadFile
FindNextFileA
FindFirstFileA
lstrlenA
ExitProcess
lstrcatA
CreateMutexA
GetCurrentProcess
VirtualProtect
Sleep
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
MultiByteToWideChar
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetCloseHandle
InternetOpenA
InternetConnectA
Sections
.tr1p0d Size: 547KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ