o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\Fluppie Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b7aa1198dd7863ef9563edf8f439b28a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7aa1198dd7863ef9563edf8f439b28a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7aa1198dd7863ef9563edf8f439b28a_JaffaCakes118
-
Size
555KB
-
MD5
b7aa1198dd7863ef9563edf8f439b28a
-
SHA1
a983a24e37b428c8fc0057d232bac74bb0b5626a
-
SHA256
93dd725f54c6cafe613a6f65f181b1d26f5d80ae0f58a7afab17cc3ea343a349
-
SHA512
46d537204de2c1af7c522e4e9ec55220246c8235bea4dca6b6f536abcaf44898f64d05b40f71c9c88008c0b9f2ba0d40a2fbae25982eea59c27f9322220378fc
-
SSDEEP
12288:5u4cpKmTjQHxjBJER0IthSjTtyu2IvT5cNczRczDWxdyfM:5u4YTjQtTERb+aHczRcRk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7aa1198dd7863ef9563edf8f439b28a_JaffaCakes118
Files
-
b7aa1198dd7863ef9563edf8f439b28a_JaffaCakes118.exe windows:4 windows x86 arch:x86
72f892c76e2640539990df04e9a73e4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
lstrlenA
GetLastError
LoadLibraryA
GetEnvironmentVariableA
GetProcAddress
CheckRemoteDebuggerPresent
LocalFree
WaitForDebugEvent
GetModuleFileNameA
GetFileSize
CreateProcessA
GetModuleHandleA
Sleep
lstrcpyA
lstrcatA
HeapFree
CloseHandle
CreateFileA
WriteFile
CreateToolhelp32Snapshot
Module32Next
Process32Next
Module32First
Process32First
lstrcmpA
GetSystemDirectoryA
FindNextFileA
FindFirstFileA
IsDebuggerPresent
ExitProcess
CreateMutexA
GetCurrentProcess
ContinueDebugEvent
FreeLibrary
ReadFile
SetFilePointer
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
DeleteFileA
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
Sections
.text Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tr1p0d Size: 389KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ