fveprompt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c13258407c0803ebc19d315bd1e1bdea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c13258407c0803ebc19d315bd1e1bdea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c13258407c0803ebc19d315bd1e1bdea_JaffaCakes118
-
Size
122KB
-
MD5
c13258407c0803ebc19d315bd1e1bdea
-
SHA1
b3487be7fe0f5af5bfb924bba741fccfae5043f6
-
SHA256
9b5b038e15205e6a254dd3c01296d0a5f7041ffe643662e0a55128a935b2ffd1
-
SHA512
01729e4ed738372b89f79fbcaee6d3c6ee2de8b86a7fbaf5f67c5e04a5ab8936c1ee2ad89dd28646bf16697cc9a05c40bcd7c443d810028e8f05b745bcec0e54
-
SSDEEP
3072:id6+vwnVS570M9kdatGCO+xmBc+hMPhPsxfEv+I:plVs7nyatGt+SYFqO+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c13258407c0803ebc19d315bd1e1bdea_JaffaCakes118
Files
-
c13258407c0803ebc19d315bd1e1bdea_JaffaCakes118.exe windows:6 windows x86 arch:x86
abb353aa8571c75ff84f163f04777b52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExW
RegCreateKeyW
RegGetValueW
RegCloseKey
kernel32
FormatMessageW
LocalFree
GetLastError
RegisterApplicationRestart
GetModuleHandleExW
SetErrorMode
GetFileAttributesW
GetDriveTypeW
ExitProcess
UnhandledExceptionFilter
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
GetCommandLineW
GetCurrentProcess
user32
SetWindowPos
LoadStringW
RegisterClassExW
CreateWindowExW
SetPropW
RemovePropW
GetPropW
DefWindowProcW
DestroyWindow
SendMessageW
msvcrt
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
__p__fmode
_exit
_cexit
__getmainargs
??2@YAPAXI@Z
memset
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_purecall
_vsnwprintf
??3@YAXPAX@Z
_XcptFilter
comctl32
ord345
slc
SLGetWindowsInformationDWORD
shell32
ord155
ord2
SHGetKnownFolderIDList
ord645
ord644
ShellExecuteW
CommandLineToArgvW
SHGetPathFromIDListEx
ord4
bdeui
?RequiresElevation@BuiVolume@@QAE_NXZ
??1BuiVolume@@QAE@XZ
?BuisDetectExistingWizard@@YGJPBG00PAPAX@Z
?Init@BuiVolume@@QAEJPAG@Z
??0BuiVolume@@QAE@XZ
?BuisLaunchHelp@@YGJABU_GUID@@@Z
Exports
Exports
??0VolumeFveStatus@@IAE@XZ
??0VolumeFveStatus@@QAE@KJ@Z
??4BuiVolume@@QAEAAV0@ABV0@@Z
??4VolumeFveStatus@@QAEAAV0@ABV0@@Z
?FailedDryRun@VolumeFveStatus@@QAE_NXZ
?GetLastConvertStatus@VolumeFveStatus@@QAEJXZ
?GetStatusFlags@VolumeFveStatus@@QAEKXZ
?HasExternalKey@VolumeFveStatus@@QAE_NXZ
?HasPassphraseProtector@VolumeFveStatus@@QAE_NXZ
?HasPinProtector@VolumeFveStatus@@QAE_NXZ
?HasRecoveryData@VolumeFveStatus@@QAE_NXZ
?HasRecoveryPassword@VolumeFveStatus@@QAE_NXZ
?HasSmartCardProtector@VolumeFveStatus@@QAE_NXZ
?HasStartupKeyProtector@VolumeFveStatus@@QAE_NXZ
?HasTpmProtector@VolumeFveStatus@@QAE_NXZ
?IsConverting@VolumeFveStatus@@QAE_NXZ
?IsDecrypted@VolumeFveStatus@@QAE_NXZ
?IsDecrypting@VolumeFveStatus@@QAE_NXZ
?IsDisabled@VolumeFveStatus@@QAE_NXZ
?IsEncrypted@VolumeFveStatus@@QAE_NXZ
?IsEncrypting@VolumeFveStatus@@QAE_NXZ
?IsFveNotifyNecessary@VolumeFveStatus@@QAE_NXZ
?IsLocked@VolumeFveStatus@@QAE_NXZ
?IsOn@VolumeFveStatus@@QAE_NXZ
?IsOsVolume@VolumeFveStatus@@QAE_NXZ
?IsPartiallyConverted@VolumeFveStatus@@QAE_NXZ
?IsPaused@VolumeFveStatus@@QAE_NXZ
?IsRoamingDevice@VolumeFveStatus@@QAE_NXZ
?IsSecure@VolumeFveStatus@@QAE_NXZ
?NO_DRIVE_LETTER@BuiVolume@@2IB
?NeedsRestart@VolumeFveStatus@@QAE_NXZ
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE