o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\PyTh@n Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5f4c7e9ca6d3d795e82502fe0a1bcac7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f4c7e9ca6d3d795e82502fe0a1bcac7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f4c7e9ca6d3d795e82502fe0a1bcac7_JaffaCakes118
-
Size
432KB
-
MD5
5f4c7e9ca6d3d795e82502fe0a1bcac7
-
SHA1
ebe79b38bc1cb198d222e3d586463ceaea814fde
-
SHA256
5db38d5b104b45383206bb3aec6a2d3cfc16888c595d7d4ec364be223030f355
-
SHA512
001b7c3b2a06295dccfb534d37e638d9125d0cd0421d74d74f25d1cdc62f233c3facc64de063015377fe8a1dc3337d82470158ed8b2c55b716d4c5092b154bfd
-
SSDEEP
6144:u2XYaAcSD3Dty9ZCOfVavfqfS5cNIdVQXc9PUgzdPOKg2mUHClWqtdyf9:tbhSDTtyu2Ivz5cN8z5UgzdSpPtdyf9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f4c7e9ca6d3d795e82502fe0a1bcac7_JaffaCakes118
Files
-
5f4c7e9ca6d3d795e82502fe0a1bcac7_JaffaCakes118.exe windows:4 windows x86 arch:x86
818af645faa6026bf77cf04144b6a2f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
lstrcpyA
Sleep
FreeLibrary
LoadLibraryA
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetModuleFileNameA
GetPrivateProfileStringA
GetCurrentProcess
GetFileSize
SetCurrentDirectoryA
LocalAlloc
GetSystemDirectoryA
ExitProcess
lstrcmpA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
CreateMutexA
GetLastError
GetProcAddress
ReadFile
lstrlenA
DeleteFileA
RtlUnwind
RaiseException
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
HeapSize
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
shell32
SHGetFolderPathA
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tr1p0d Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 336KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ