o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\New Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3530b295cee07d91ecb6c84db189570a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3530b295cee07d91ecb6c84db189570a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3530b295cee07d91ecb6c84db189570a_JaffaCakes118
-
Size
524KB
-
MD5
3530b295cee07d91ecb6c84db189570a
-
SHA1
c46407cab4ff3e0e05b5c913000bfd85ece8b8c7
-
SHA256
4bafee97f57abb7b1012c529648bcb78413545951cbc144b72f57f99bf67a467
-
SHA512
f224558bf61f96c0584245bac3df522709ee9aa78295390a3ea2099bc2c5338437b652735214697544c3a740ec56f348d68260197a73aa462cfbdda37b84ad5d
-
SSDEEP
12288:fn2Md7ikPdKt9cR1hc3thvYxrdei4zPdeTmC7QjOCPUwQu:fn57rUIR38XtzPd2nQjfUwQu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3530b295cee07d91ecb6c84db189570a_JaffaCakes118
Files
-
3530b295cee07d91ecb6c84db189570a_JaffaCakes118.exe windows:4 windows x86 arch:x86
b65dfec5e5333ea3fdd9b979d53baebc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
GetLastError
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
LocalFree
GetShortPathNameA
lstrcpyA
GetModuleFileNameA
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
VirtualAlloc
lstrlenA
CloseHandle
Process32Next
Module32First
Process32First
lstrcmpA
CreateToolhelp32Snapshot
ExitProcess
Module32Next
GetFileSize
ReadFile
CreateFileA
FindNextFileA
FindFirstFileA
lstrcatA
CreateMutexA
GetCurrentProcess
GetModuleHandleA
VirtualProtect
Sleep
VirtualQuery
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
RtlUnwind
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
MultiByteToWideChar
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueA
GetUserNameA
shell32
SHGetFolderPathA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
Sections
.tr1p0d Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ