Big_Motor
JOY_Close
JOY_init
Small_Motor
Behavioral task
behavioral1
Sample
epsxe152.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
epsxe152.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ePSXe.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ePSXe.exe
Resource
win10v2004-20231215-en
Target
epsxe152.zip
Size
269KB
MD5
5c5c86cf1e543ced08890fe5b43fdeef
SHA1
c0829c85aba297e769ec3657b2116c96b7bbcf10
SHA256
4a80b5b73c6ee687fe725157c340261988a054af048bfac0a1e07057ccf591a4
SHA512
9c93242a9d4990d45c28bbcc94a72c110df3fc93bca705701784a011db37e368230bc7595e99cf9efa22f94a3b8a19836ee4c292b16f60b26b33475c9ac9f10b
SSDEEP
6144:d8/BRrl1rERK8L17NiPiCk3p+6U7fFxNd4c2M+TQN9axVd6:d6BhTkZ+6yXN+TucVA
resource | yara_rule |
---|---|
static1/unpack001/ePSXe.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/burutter.dll |
unpack001/ePSXe.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetEnvironmentStrings
OutputDebugStringA
CloseHandle
DeviceIoControl
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
CreateFileA
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
Big_Motor
JOY_Close
JOY_init
Small_Motor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE