Static task
static1
Behavioral task
behavioral1
Sample
XUPX/XUPX.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
XUPX/XUPX.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
XUPX/upx.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
XUPX/upx.html
Resource
win10v2004-20231215-en
General
-
Target
14218151a0dd147aeaaba4d560129437
-
Size
311KB
-
MD5
14218151a0dd147aeaaba4d560129437
-
SHA1
a649eced09ebe8cbf89e22e30c45243e067bab09
-
SHA256
11e13c59d2e07b1fbed790c5cb2d3f854d20f1399430c7a33af728d4954940d9
-
SHA512
9f9880f7fdfe3943ec24aef766f3c6c8325cf8b2ba917699bc6d02ddec7824d82fcc3929e58c5d2ef43b666b5e6c36ef45469dffa31d8886dbc7ce831375ce3e
-
SSDEEP
6144:WfsloROm/MA2ptx/Z1xPWSN1VeLcWa74uNkiTJG+cX:WkWO+MAa/Z1xPWMn3J7ZNkiTA+s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/XUPX/XUPX.exe
Files
-
14218151a0dd147aeaaba4d560129437.zip
-
XUPX/UPX_License.txt
-
XUPX/XUPX.exe.exe windows:4 windows x86 arch:x86
a998619b078d034604921464896f4a37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_strnicmp
strncmp
strncpy
_strdup
free
sprintf
strlen
strcpy
strcat
strcmp
memmove
memcpy
_CIlog
floor
ceil
_CIpow
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
ExpandEnvironmentStringsA
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
InitializeCriticalSection
GetCommandLineA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
PeekNamedPipe
ReadFile
GetExitCodeProcess
GetModuleFileNameA
GetEnvironmentVariableA
SetEnvironmentVariableA
Sleep
HeapSize
WideCharToMultiByte
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
GetTempPathA
LoadLibraryA
GetProcAddress
FreeLibrary
CopyFileA
FindNextFileA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
MoveFileA
GetCurrentDirectoryA
CreateDirectoryA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
HeapReAlloc
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
SetConsoleTextAttribute
SetConsoleMode
ReadConsoleA
GetLastError
FreeConsole
DeleteCriticalSection
WriteConsoleA
comctl32
InitCommonControls
user32
CharToOemA
EnableWindow
DefWindowProcA
DestroyWindow
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
UnregisterClassA
LoadCursorA
RegisterClassExA
IsWindowEnabled
GetSystemMetrics
CreateWindowExA
SetWindowLongA
SendMessageA
SetFocus
CreateAcceleratorTableA
SetForegroundWindow
BringWindowToTop
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
MessageBoxA
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
gdi32
GetStockObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ole32
CoCreateGuid
StringFromGUID2
CoInitialize
shell32
ShellExecuteExA
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 167B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 288KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
XUPX/XUPX_License.txt
-
XUPX/XUPX_Liesmich.txt
-
XUPX/upx.html.html .vbs polyglot