E:\develop\tools\desktop-toasts\Release\BitCometToastsNotifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868.exe
Resource
win10v2004-20240802-en
General
-
Target
083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868
-
Size
1.3MB
-
MD5
70259a722aa58a9128b126f19eac4c4c
-
SHA1
6c58c121b0c15d425d13745d97d39a7dd59284b5
-
SHA256
083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868
-
SHA512
21e19503ac9d6cd84401bb3f3b6effbff359cdd98e1b772e7f3f0cc6280e6f00100b7c3f995c4e22224634e31d07fbc4de57c2b5dff4e1eae80e71610a8d5c0d
-
SSDEEP
12288:MZubBLYtI9FzXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDtL:MUVLY+jzsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868
Files
-
083c46ad94fd3607e89d3e4ae10018cf3569604cfebf7f87269290354f1b1868.exe windows:6 windows x86 arch:x86
0cfcfb692dec5b2b996a15c88a912c18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
api-ms-win-core-winrt-string-l1-1-0
WindowsGetStringRawBuffer
WindowsCreateStringReference
WindowsIsStringEmpty
WindowsStringHasEmbeddedNull
WindowsCreateString
WindowsDeleteString
api-ms-win-core-winrt-l1-1-0
RoRevokeActivationFactories
RoRegisterActivationFactories
RoUninitialize
RoInitialize
RoGetActivationFactory
RoActivateInstance
api-ms-win-core-winrt-error-l1-1-0
RoOriginateErrorW
RoOriginateError
shlwapi
UrlCreateFromPathW
kernel32
GetFileType
LCMapStringW
FreeEnvironmentStringsW
CreateFileW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
InitOnceExecuteOnce
GetCurrentProcess
GetPackageFamilyName
GetModuleFileNameW
EncodePointer
GetLastError
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
RaiseException
DecodePointer
AcquireSRWLockShared
HeapFree
CreateMutexW
InitializeCriticalSectionEx
WaitForSingleObject
SetStdHandle
HeapSize
CreateEventW
SetEvent
HeapReAlloc
CloseHandle
HeapAlloc
DeleteCriticalSection
GetProcessHeap
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
RtlUnwind
OutputDebugStringW
GetStringTypeW
GetCurrentThreadId
WriteConsoleW
InitializeSListHead
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
DefWindowProcW
SendMessageTimeoutW
CreateWindowExW
SendMessageW
RegisterClassExW
ShowWindow
DispatchMessageW
EnumWindows
GetWindowLongW
LoadIconW
LoadCursorW
SetWindowLongW
PostThreadMessageW
PostQuitMessage
UpdateWindow
SetForegroundWindow
IsIconic
GetMessageW
EndPaint
GetWindowTextW
TranslateMessage
BeginPaint
advapi32
RegSetKeyValueW
ole32
CoResumeClassObjects
CoRegisterClassObject
StringFromCLSID
CoReleaseServerProcess
CoAddRefServerProcess
CoRevokeClassObject
CoTaskMemFree
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE