D:\VS08Files\Password stealer Version 1.0.0.0\SourceV 1.0.0.0\TestPass1\Release\TestPass1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
09db4ea61a9c878e5bbb77e8f3c290c1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09db4ea61a9c878e5bbb77e8f3c290c1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
09db4ea61a9c878e5bbb77e8f3c290c1_JaffaCakes118
-
Size
364KB
-
MD5
09db4ea61a9c878e5bbb77e8f3c290c1
-
SHA1
a6a6edccbc6ac0d43d9c1937ecb61caecffae888
-
SHA256
7250d5bfcb4b1ddfbf373a226d46ee5efebb9d5a2d16f1e59ba4eb68774f5cce
-
SHA512
30905e79eb9b1043deb8e678e5306e49d7ac0b04484f7c25328b4049bf6d94eca127f446445aa095f8e6d6cf4937a54bf507014d1ef98937d93c26b0d3287428
-
SSDEEP
6144:ePCIhBLTLigKKy/TlNvru0V9w/b43vqvFwrcwB/D49:M7hKKy/xdid/E+IcwB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09db4ea61a9c878e5bbb77e8f3c290c1_JaffaCakes118
Files
-
09db4ea61a9c878e5bbb77e8f3c290c1_JaffaCakes118.exe windows:5 windows x86 arch:x86
e96b495db82850fbe054bcfd023d2135
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetOpenA
FtpSetCurrentDirectoryA
FtpPutFileA
InternetCloseHandle
FtpCreateDirectoryA
InternetConnectA
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetCPInfo
GetOEMCP
GetFileAttributesA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetACP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
GetExitCodeProcess
CreateProcessA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalGetAtomNameA
GetModuleHandleW
GetCurrentProcessId
GlobalAddAtomA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
WaitForSingleObject
GetLastError
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
lstrlenA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
GetComputerNameA
AllocConsole
Sleep
WinExec
GetModuleFileNameA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
GetCommandLineA
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSystemMetrics
GetSysColorBrush
GetWindowThreadProcessId
GetLastActivePopup
EnableWindow
MessageBoxA
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
DestroyMenu
CopyRect
ShowWindow
FindWindowA
IsWindowEnabled
shlwapi
PathRemoveFileSpecA
PathFindExtensionA
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
DeleteDC
SetTextColor
SetMapMode
GetClipBox
GetStockObject
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
PtVisible
DeleteObject
SetViewportOrgEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ