o:\Programmieren\Codesoft Releases\_NEW BETATEST\Codesoft PW Stealer\v0.50\Kaiser_Franzl Version\release\Codesoft-PW_Stealer_Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08ed3847a51e437d7f7caf3c639b1695_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
08ed3847a51e437d7f7caf3c639b1695_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08ed3847a51e437d7f7caf3c639b1695_JaffaCakes118
-
Size
390KB
-
MD5
08ed3847a51e437d7f7caf3c639b1695
-
SHA1
3355e401c9dcdaffad0a3f9ec8a070eb5c1fd2bf
-
SHA256
125fa2db20b804005fd7c0ed778f7704df09d87d6ae2146381b0556fa87dffa3
-
SHA512
058c64f4ebd3494b5238e198de3a526b4d3df0d9891b2118855e1c916551de09fe910af38e026a55373af8c6f0bf1f630b8755d56e2786aca66966ffebcce69c
-
SSDEEP
12288:fgc6yEhSDTtyu2Ivz5cN8zWq4dWYR2dyfl:fgc6yPaH8zAtRtN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08ed3847a51e437d7f7caf3c639b1695_JaffaCakes118
Files
-
08ed3847a51e437d7f7caf3c639b1695_JaffaCakes118.exe windows:4 windows x86 arch:x86
97664669edfa6daccb4b70c041a9d8bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
lstrcatA
lstrcpyA
Sleep
FreeLibrary
LoadLibraryA
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetPrivateProfileStringA
CreateMutexA
GetFileSize
SetCurrentDirectoryA
LocalAlloc
GetSystemDirectoryA
ExitProcess
lstrcmpA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
UnhandledExceptionFilter
TerminateProcess
GetLastError
GetProcAddress
ReadFile
lstrlenA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
IsDebuggerPresent
user32
wsprintfA
advapi32
RegOpenKeyExA
GetUserNameA
RegCloseKey
shell32
SHGetFolderPathA
msvcr80
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
memcpy_s
memmove_s
??_V@YAXPAX@Z
??0exception@std@@QAE@XZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
??3@YAXPAX@Z
memchr
strlen
strcmp
__CxxFrameHandler3
memset
remove
??2@YAPAXI@Z
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.umap Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 334KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ