Static task
static1
Behavioral task
behavioral1
Sample
Power Bomberman.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Power Bomberman.exe
Resource
win10v2004-20231215-en
General
-
Target
Power Bomberman.exe
-
Size
33.1MB
-
MD5
9c8f6123ae36fb4079b432f4ac1280e9
-
SHA1
a6666f8dfed0498edc496931df6e0a79eb31dc60
-
SHA256
b01b6797552dd0d7a6d06fb8b347eafe47931cbd062e6a24dc96b441a9517d40
-
SHA512
00ea29d4741b8ddf6be48c1b77fb1c6881daf5887c71901fd0b5adcf8651f40d6c16599bed88cf361117655a2ae78fe121d0bdcb86b88c929fc5a75330d2127d
-
SSDEEP
786432:Ets1kBmXKYmCmUoJt1haFjtH/Id3yUNQeu+EN:Ets1kBmX3mLUIaFjF/IQUg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Power Bomberman.exe
Files
-
Power Bomberman.exe.exe windows:6 windows x86 arch:x86
Password: Bomberman
56a52ee37562f360a0c069c0da5348d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
HttpQueryInfoA
InternetGetConnectedState
InternetCrackUrlA
d3d11
D3D11CreateDevice
dbghelp
MiniDumpWriteDump
winmm
joyGetPosEx
joyGetPos
mciSendStringA
timeEndPeriod
timeGetDevCaps
timeBeginPeriod
ws2_32
socket
setsockopt
sendto
send
select
recvfrom
recv
ntohs
WSAGetLastError
inet_addr
getsockopt
ioctlsocket
connect
closesocket
bind
accept
htons
inet_ntoa
WSAStartup
getaddrinfo
freeaddrinfo
getpeername
__WSAFDIsSet
listen
htonl
gdiplus
GdiplusStartup
GdiplusShutdown
comctl32
InitCommonControlsEx
kernel32
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SignalObjectAndWait
CreateTimerQueue
GetTickCount
SwitchToThread
TryEnterCriticalSection
WriteConsoleW
HeapSize
SetEndOfFile
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
ReadConsoleW
GetTimeZoneInformation
HeapReAlloc
DecodePointer
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
FreeLibraryAndExitThread
GetModuleHandleA
OutputDebugStringA
GetCurrentProcess
GetCommandLineW
ExpandEnvironmentStringsW
CreateDirectoryW
CreateFileW
GetFinalPathNameByHandleW
GetFullPathNameW
CloseHandle
SetUnhandledExceptionFilter
GetLastError
SetErrorMode
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
MoveFileA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableW
GetCurrentDirectoryW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
VirtualAlloc
GetProcAddress
LoadLibraryW
SetLastError
CreateThread
GetExitCodeThread
LocalFree
FormatMessageW
GetVersionExW
GetLocaleInfoW
GetUserDefaultLCID
GetConsoleWindow
SetCurrentDirectoryA
GetCurrentDirectoryA
FreeLibrary
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerW
GetTickCount64
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GlobalAlloc
GlobalUnlock
GlobalLock
GetFileAttributesA
VerSetConditionMask
VerifyVersionInfoW
ExitProcess
lstrlenA
WaitForSingleObjectEx
CreateEventExW
LoadLibraryA
SetEvent
ResetEvent
CreateEventW
IsProcessorFeaturePresent
UnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
HeapAlloc
HeapFree
GetProcessHeap
FindFirstFileExW
GetModuleHandleExW
EncodePointer
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
FileTimeToSystemTime
GetFileAttributesExW
SetFileAttributesW
MoveFileExW
ReadFile
HeapValidate
HeapWalk
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
GetStdHandle
WriteFile
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
GetThreadTimes
UnregisterWaitEx
GetDateFormatW
SystemTimeToTzSpecificLocalTime
user32
LoadImageW
MoveWindow
SetWindowTextW
ClientToScreen
MapWindowPoints
CreateDialogParamW
DialogBoxParamW
EndDialog
GetDlgItem
SetDlgItemTextW
GetDlgItemTextW
DrawTextW
ScreenToClient
GetAsyncKeyState
keybd_event
OpenClipboard
CloseClipboard
SetClipboardData
LoadCursorW
EmptyClipboard
IsClipboardFormatAvailable
GetClientRect
SetDlgItemTextA
GetRawInputDeviceInfoA
GetRawInputDeviceList
BringWindowToTop
DestroyWindow
SetCapture
RegisterClassExW
DefWindowProcW
ReleaseDC
GetDC
GetMonitorInfoW
MonitorFromWindow
EnumDisplaySettingsW
SetWindowLongW
GetCursorPos
GetClipboardData
SetCursor
SetCursorPos
AdjustWindowRectEx
GetWindowRect
UpdateWindow
GetSystemMetrics
SetWindowPos
ShowWindow
SetForegroundWindow
GetFocus
ReleaseCapture
SendMessageW
GetActiveWindow
MessageBoxW
SetProcessDPIAware
IsDialogMessageW
SetFocus
PostMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
wsprintfW
MessageBoxA
CreateWindowExW
GetKeyState
gdi32
GetStockObject
GetDeviceCaps
SelectObject
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoCreateFreeThreadedMarshaler
dxgi
CreateDXGIFactory1
rpcrt4
UuidCreate
UuidToStringW
dwmapi
DwmGetCompositionTimingInfo
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 27.7MB - Virtual size: 27.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mydata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ