D:\Documents and Settings\Zynastor\My Documents\Visual Studio Projects\zLoaderLib\Release\zLoaderLib.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ZynMapHack.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ZynMapHack.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
zLoader.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
zLoader.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
zLoader.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
zLoader.dll
Resource
win10v2004-20240419-en
General
-
Target
1527929be6430df7654bdd7033f086c8_JaffaCakes118
-
Size
127KB
-
MD5
1527929be6430df7654bdd7033f086c8
-
SHA1
67af8cd61c0a3ebdbd6c4dce7b3d3f8df9c8b649
-
SHA256
051a16792ffef60616c48565ed069278cd309f592fb087986a93dc4dbc1a0c6f
-
SHA512
a276c10c87b3d7e1de45b6ea4cd6ec2752d58b02b64ac70f86b9247ed137f128161ac9953f334dc85366a26ca8a135defe28a05c8f5e22d6cef64669de7f2eca
-
SSDEEP
3072:knqptdDHTOV3qUCJH2Nd/TpObO52RSoVIhzg3+V:mUt1TBRGd/NOS5SS3hzkI
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/ZynMapHack.dll unpack001/zLoader.exe unpack001/zLoader.snp
Files
-
1527929be6430df7654bdd7033f086c8_JaffaCakes118.zip
-
!Readme - ZynMapHack.txt
-
!Readme - zLoader.txt
-
ZynMapHack.dll.dll windows:4 windows x86 arch:x86
b9461ef83483f6560bfa00759052a92d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
SetWindowLongA
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 47KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
ZynMapHack.ini
-
zLoader.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 26KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
zLoader.snp.dll windows:4 windows x86 arch:x86
fcf077211dbce7422a608befc7d76b7d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DisableThreadLibraryCalls
LoadLibraryA
CloseHandle
WaitForSingleObject
CreateMutexA
ReleaseMutex
GetCurrentProcessId
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetCurrentThreadId
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetEnvironmentVariableA
user32
SetWindowsHookExA
SendMessageTimeoutA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
Exports
Exports
?RemoteLoadLibrary@@YAPAUHINSTANCE__@@PAUHWND__@@PBD@Z
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SHARED Size: 4KB - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ