o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\DeatH4LifE Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a9315aae67914a6197f00f5cad3d207_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a9315aae67914a6197f00f5cad3d207_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a9315aae67914a6197f00f5cad3d207_JaffaCakes118
-
Size
576KB
-
MD5
6a9315aae67914a6197f00f5cad3d207
-
SHA1
6c1356a9e7f4fd90e038e7ba591283266c77a6cd
-
SHA256
7b6fb19d602a376c42e09a9b5730fd5300c0a2dc4411cd6ea5daf02bd0a61728
-
SHA512
7c54cb0e70a9ca20945307ff095847f3444b2fa0a4ef2ef0583af4d6aff68f29ae839decbe1dd218d2ce481a752ad87507d6833bd87b50d7cfe6c5ca6dd782be
-
SSDEEP
12288:iSPJOarKqYDqSBJER0IwczDW+RhSDTtyu2Ivz5cN8z5dyfw:iSPhKqYFTERbwcGaH8zCI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a9315aae67914a6197f00f5cad3d207_JaffaCakes118
Files
-
6a9315aae67914a6197f00f5cad3d207_JaffaCakes118.exe windows:4 windows x86 arch:x86
3716cd94bf5f3587d28c11f2316b08ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
LoadLibraryA
GetEnvironmentVariableA
GetProcAddress
GetTempPathA
CreateFileA
LocalFree
FreeLibrary
LoadResource
GetModuleFileNameA
WriteFile
GetModuleHandleA
Sleep
lstrcpyA
FindResourceA
ExitProcess
Module32Next
CloseHandle
Module32First
Process32First
lstrcmpA
GetSystemDirectoryA
CreateToolhelp32Snapshot
ContinueDebugEvent
IsDebuggerPresent
CheckRemoteDebuggerPresent
CreateProcessA
WaitForDebugEvent
ReadFile
GetFileSize
FindNextFileA
FindFirstFileA
lstrcatA
lstrlenA
GetComputerNameA
CreateMutexA
SizeofResource
Process32Next
GetCurrentProcess
SetFilePointer
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
DeleteFileA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tr1p0d Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ