o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\alexanderjanjic Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3148538fceae8b42f8507126d164cae4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3148538fceae8b42f8507126d164cae4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3148538fceae8b42f8507126d164cae4_JaffaCakes118
-
Size
369KB
-
MD5
3148538fceae8b42f8507126d164cae4
-
SHA1
2e0b7da90c6c0914cc5ac169886bd175680f593f
-
SHA256
9773109ea9114271231f802b7445fe8575f0b4a56309041566fb1b5298804e7a
-
SHA512
7a85212ba30a6a8259408e8428b37700a749c489923f0a1288b7ae72578c561e15a1cb03f44fbc852e8b35e7faf26d19e0a61b7e705b770b786b2a0b338eab0f
-
SSDEEP
6144:Tbgc+P5iJOZAcSD3Dty9ZCOfVavfqfS5cNIdVQXcrDeq4p/TWjERGL:Tbgc6AahSDTtyu2Ivz5cN8zWq4dWYRq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3148538fceae8b42f8507126d164cae4_JaffaCakes118
Files
-
3148538fceae8b42f8507126d164cae4_JaffaCakes118.exe windows:4 windows x86 arch:x86
97664669edfa6daccb4b70c041a9d8bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
lstrcatA
lstrcpyA
Sleep
FreeLibrary
LoadLibraryA
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetPrivateProfileStringA
CreateMutexA
GetFileSize
SetCurrentDirectoryA
LocalAlloc
GetSystemDirectoryA
ExitProcess
lstrcmpA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
UnhandledExceptionFilter
TerminateProcess
GetLastError
GetProcAddress
ReadFile
lstrlenA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
IsDebuggerPresent
user32
wsprintfA
advapi32
RegOpenKeyExA
GetUserNameA
RegCloseKey
shell32
SHGetFolderPathA
msvcr80
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
memcpy_s
memmove_s
??_V@YAXPAX@Z
??0exception@std@@QAE@XZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
??3@YAXPAX@Z
memchr
strlen
strcmp
__CxxFrameHandler3
memset
remove
??2@YAPAXI@Z
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.umap Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ