o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\CryNex Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
65d25c7754f99b1b822b12b11e7cd6a2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65d25c7754f99b1b822b12b11e7cd6a2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65d25c7754f99b1b822b12b11e7cd6a2_JaffaCakes118
-
Size
557KB
-
MD5
65d25c7754f99b1b822b12b11e7cd6a2
-
SHA1
1eb6e684c852d01820342524c5eae1f0b8dcee35
-
SHA256
8e0cb1eb05ecbb7f3105abda0d67720b3c5965a72578db4b6d0b64097016d984
-
SHA512
521672850cb90cd59c70d2540ef159406b4919a0c732e98333ed91f22e2d4054d451a8583e397c49ad88b4fc328b52de479ac223cab32225cd24070d4eb856cd
-
SSDEEP
12288:WBJER0IQhSjTtyu2IvT5cNcziczDSV19tM76WitarrbLr:WTERbzaHczic2Ltdxarrr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65d25c7754f99b1b822b12b11e7cd6a2_JaffaCakes118
Files
-
65d25c7754f99b1b822b12b11e7cd6a2_JaffaCakes118.exe windows:4 windows x86 arch:x86
1e3c3f03eddf8e2d92a8c391dc05cb52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
LocalFree
lstrcpyA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
VirtualAlloc
GetComputerNameA
CloseHandle
lstrcmpA
GetSystemDirectoryA
CreateToolhelp32Snapshot
Module32Next
CreateFileA
Process32Next
Module32First
Process32First
GetFileSize
ReadFile
FindNextFileA
FindFirstFileA
lstrlenA
ExitProcess
lstrcatA
CreateMutexA
GetCurrentProcess
VirtualProtect
Sleep
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
IsDebuggerPresent
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
MultiByteToWideChar
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetCloseHandle
InternetOpenA
InternetConnectA
Sections
.tr1p0d Size: 547KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ