o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\CryNex Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4af12a165e26bd0dae8ab5d4c9d5d15e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4af12a165e26bd0dae8ab5d4c9d5d15e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4af12a165e26bd0dae8ab5d4c9d5d15e_JaffaCakes118
-
Size
3.2MB
-
MD5
4af12a165e26bd0dae8ab5d4c9d5d15e
-
SHA1
a234fff06abcbef1f379e1c30732c1eb259e9453
-
SHA256
f5115abe0f35d73303a7b4e68ea362c03835fcd544cf97f5f7bf3cdd17e0995b
-
SHA512
81d99b3948f05334a2cc724aeae77abaa6756052480211aa6994cd0e3e0ef71f25221e938243bb35266173137c3631320c0aca05ed3159c407d3a7df7dd5c4f9
-
SSDEEP
12288:SBJER0IQhSjTtyu2IvT5cNcziczDSV19tM76WitarrbLQ:STERbzaHczic2LtdxarrQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4af12a165e26bd0dae8ab5d4c9d5d15e_JaffaCakes118
Files
-
4af12a165e26bd0dae8ab5d4c9d5d15e_JaffaCakes118.exe windows:4 windows x86 arch:x86
1e3c3f03eddf8e2d92a8c391dc05cb52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
LocalFree
lstrcpyA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
VirtualAlloc
GetComputerNameA
CloseHandle
lstrcmpA
GetSystemDirectoryA
CreateToolhelp32Snapshot
Module32Next
CreateFileA
Process32Next
Module32First
Process32First
GetFileSize
ReadFile
FindNextFileA
FindFirstFileA
lstrlenA
ExitProcess
lstrcatA
CreateMutexA
GetCurrentProcess
VirtualProtect
Sleep
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
MultiByteToWideChar
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetCloseHandle
InternetOpenA
InternetConnectA
Sections
.tr1p0d Size: 547KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ