Static task
static1
Behavioral task
behavioral1
Sample
bomb.exe
Resource
win10v2004-20240802-en
General
-
Target
bomb.exe
-
Size
8KB
-
MD5
0a8168d9003bab3ea94f271f5a93beb6
-
SHA1
e3c9a7c6fea85b2da97e33bb3e5f83466948959c
-
SHA256
aa4fd2e3eff59d5a5a94f84059381cfc056f305c42a3f6381a3d263106f79d11
-
SHA512
9b583be5790415fa3ae5f906355cbb13cc1e82caf63de2a0a50a05fd0cd291c72089e2e10cc88ecd6eab165da8a2087fabfd01d82c048386477c182155a2dfe2
-
SSDEEP
48:a7t5OZOO46wyY3r9xjg4nH170zFLqnLiB4kvFEZ7ePdmnmIoHOQSAjBzO/MHuX:q4I6w9r9etGnu4kvCw1mrIS6dOJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bomb.exe
Files
-
bomb.exe.exe windows:5 windows x64 arch:x64
Password: smollersomehow
f02c54c2307e26959cfa6540a873fd79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
kernel32
GetVersionExA
GetStdHandle
WriteFile
ReadFile
FindFirstFileW
FindNextFileW
FindClose
CloseHandle
CreateFileW
DeleteFileW
RemoveDirectoryW
ExitProcess
RegOpenKeyExA
RegSetValueExA
GetModuleFileNameA
lstrlenW
CreateProcessA
GetCurrentProcess
OpenProcessToken
user32
MessageBoxW
advapi32
RegDeleteKeyA
CheckTokenMembership
shell32
ShellExecuteW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ