Big_Motor
JOY_Close
JOY_init
Small_Motor
Behavioral task
behavioral1
Sample
pcsx/burutter.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
pcsx/burutter.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
pcsx/ePSXe.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
pcsx/ePSXe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
pcsx/epsxe.chm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
pcsx/epsxe.chm
Resource
win10v2004-20231222-en
Target
pcsx.zip
Size
270KB
MD5
66d03349dcf44f0f326d0b5d28926b82
SHA1
7cf42217002c987cfc4ca1f6d35329ac1865d6f6
SHA256
1da7915a421a6230cb148a450445c010b98b5c7dd4bd83a22691a459c6852ea0
SHA512
26e9c50abbb02bd2497aeb4cabe3aa46751a55e11ec88ebd2fe65405ada309664f6ff7682ba5edf7e8d07aba39c50612c35edc42d6076c603e6d63fd5f0c4e34
SSDEEP
6144:xU/Ol1rKRK8L17Ni4uUGkfrENTi52PBXabNYUZ2rRTX:xSSUu9kfGi4mYoqX
resource | yara_rule |
---|---|
static1/unpack001/pcsx/ePSXe.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/pcsx/burutter.dll |
unpack001/pcsx/ePSXe.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetEnvironmentStrings
OutputDebugStringA
CloseHandle
DeviceIoControl
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
CreateFileA
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
Big_Motor
JOY_Close
JOY_init
Small_Motor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE