fveprompt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
345ca0d53faf471e94d319533ec3e99f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
345ca0d53faf471e94d319533ec3e99f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
345ca0d53faf471e94d319533ec3e99f_JaffaCakes118
-
Size
129KB
-
MD5
345ca0d53faf471e94d319533ec3e99f
-
SHA1
23478464bd94b67298fa7bfd99436c93690fa3e1
-
SHA256
524678b6818591e3e724d4aa003bd103730621a188bc55c05efe0c1228936d10
-
SHA512
040ec695d163797713c50192a27262209c2715ce5f12751b4945af36ac365d7c96480c696a3cb8687944d8a7682fe23df7f670585c343d7592aff908652282a3
-
SSDEEP
3072:wd0TvwnVS570M9kdatGCO+xmBc+hMPhPsxTba/yCy5lC:d0Vs7nyatGt+SYF2bWSi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 345ca0d53faf471e94d319533ec3e99f_JaffaCakes118
Files
-
345ca0d53faf471e94d319533ec3e99f_JaffaCakes118.exe windows:6 windows x86 arch:x86
abb353aa8571c75ff84f163f04777b52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExW
RegCreateKeyW
RegGetValueW
RegCloseKey
kernel32
FormatMessageW
LocalFree
GetLastError
RegisterApplicationRestart
GetModuleHandleExW
SetErrorMode
GetFileAttributesW
GetDriveTypeW
ExitProcess
UnhandledExceptionFilter
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
GetCommandLineW
GetCurrentProcess
user32
SetWindowPos
LoadStringW
RegisterClassExW
CreateWindowExW
SetPropW
RemovePropW
GetPropW
DefWindowProcW
DestroyWindow
SendMessageW
msvcrt
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
__p__fmode
_exit
_cexit
__getmainargs
??2@YAPAXI@Z
memset
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_purecall
_vsnwprintf
??3@YAXPAX@Z
_XcptFilter
comctl32
ord345
slc
SLGetWindowsInformationDWORD
shell32
ord155
ord2
SHGetKnownFolderIDList
ord645
ord644
ShellExecuteW
CommandLineToArgvW
SHGetPathFromIDListEx
ord4
bdeui
?RequiresElevation@BuiVolume@@QAE_NXZ
??1BuiVolume@@QAE@XZ
?BuisDetectExistingWizard@@YGJPBG00PAPAX@Z
?Init@BuiVolume@@QAEJPAG@Z
??0BuiVolume@@QAE@XZ
?BuisLaunchHelp@@YGJABU_GUID@@@Z
Exports
Exports
??0VolumeFveStatus@@IAE@XZ
??0VolumeFveStatus@@QAE@KJ@Z
??4BuiVolume@@QAEAAV0@ABV0@@Z
??4VolumeFveStatus@@QAEAAV0@ABV0@@Z
?FailedDryRun@VolumeFveStatus@@QAE_NXZ
?GetLastConvertStatus@VolumeFveStatus@@QAEJXZ
?GetStatusFlags@VolumeFveStatus@@QAEKXZ
?HasExternalKey@VolumeFveStatus@@QAE_NXZ
?HasPassphraseProtector@VolumeFveStatus@@QAE_NXZ
?HasPinProtector@VolumeFveStatus@@QAE_NXZ
?HasRecoveryData@VolumeFveStatus@@QAE_NXZ
?HasRecoveryPassword@VolumeFveStatus@@QAE_NXZ
?HasSmartCardProtector@VolumeFveStatus@@QAE_NXZ
?HasStartupKeyProtector@VolumeFveStatus@@QAE_NXZ
?HasTpmProtector@VolumeFveStatus@@QAE_NXZ
?IsConverting@VolumeFveStatus@@QAE_NXZ
?IsDecrypted@VolumeFveStatus@@QAE_NXZ
?IsDecrypting@VolumeFveStatus@@QAE_NXZ
?IsDisabled@VolumeFveStatus@@QAE_NXZ
?IsEncrypted@VolumeFveStatus@@QAE_NXZ
?IsEncrypting@VolumeFveStatus@@QAE_NXZ
?IsFveNotifyNecessary@VolumeFveStatus@@QAE_NXZ
?IsLocked@VolumeFveStatus@@QAE_NXZ
?IsOn@VolumeFveStatus@@QAE_NXZ
?IsOsVolume@VolumeFveStatus@@QAE_NXZ
?IsPartiallyConverted@VolumeFveStatus@@QAE_NXZ
?IsPaused@VolumeFveStatus@@QAE_NXZ
?IsRoamingDevice@VolumeFveStatus@@QAE_NXZ
?IsSecure@VolumeFveStatus@@QAE_NXZ
?NO_DRIVE_LETTER@BuiVolume@@2IB
?NeedsRestart@VolumeFveStatus@@QAE_NXZ
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE