o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\Squeale Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95a7fbcde03d37bb2d970d97078406b6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95a7fbcde03d37bb2d970d97078406b6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95a7fbcde03d37bb2d970d97078406b6_JaffaCakes118
-
Size
709KB
-
MD5
95a7fbcde03d37bb2d970d97078406b6
-
SHA1
2ee803f103cc85ce0ed654d09fdd668002af0a21
-
SHA256
0b6ce2ae7cd9bfd94a27b22aad15412de231e3e54df2cc40798f3b0eb4cfd31e
-
SHA512
3f82d7d03a008639db29cd99559b65185e10e8cd16d0b78b432eb119edc4f8433b713c5a32514632db841157acede561a99dd80c87f713b14e7f20f72dac4244
-
SSDEEP
12288:u3jccYd/RXX8Xr0l0CvJTuqexUQ0AOqrJOBGVpcIgqkyICuhFMURhZzSWJ3h:6jclrYr0l0CvJT1w05mJOB+eN9CgMyZl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95a7fbcde03d37bb2d970d97078406b6_JaffaCakes118
Files
-
95a7fbcde03d37bb2d970d97078406b6_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f062c912ee87eb8279ec332e9673b0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
GetModuleFileNameA
GetProcAddress
GetTempPathA
FindFirstFileA
FindNextFileA
LoadLibraryA
FreeLibrary
GetSystemTime
GetShortPathNameA
lstrcpyA
GetEnvironmentVariableA
lstrlenA
GetComputerNameA
GetProcessHeap
IsBadReadPtr
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
CloseHandle
Module32First
lstrcmpA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32Next
GetLastError
ExitProcess
CreateMutexA
Sleep
CopyFileA
GetModuleHandleA
VirtualFree
GetCurrentProcess
SetEndOfFile
CreateFileW
GetLocaleInfoW
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapValidate
GetModuleFileNameW
DeleteFileA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
SetFilePointer
ReadFile
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
advapi32
RegQueryValueA
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameA
shell32
SHGetFolderPathA
shlwapi
PathUnquoteSpacesA
PathRemoveArgsA
wininet
InternetConnectA
InternetOpenA
FtpPutFileA
InternetCloseHandle
FtpSetCurrentDirectoryA
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 292KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ