Plgmdb
Static task
static1
Behavioral task
behavioral1
Sample
fdc722e137881d7e37dc7cd3a58a6112ead7076e4c4d42ddec29f3cd8d0badc8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fdc722e137881d7e37dc7cd3a58a6112ead7076e4c4d42ddec29f3cd8d0badc8.dll
Resource
win10v2004-20220812-en
General
-
Target
fdc722e137881d7e37dc7cd3a58a6112ead7076e4c4d42ddec29f3cd8d0badc8
-
Size
584KB
-
MD5
bc9c768068b03b5b5262b8f438fbfb10
-
SHA1
880f8e99aa59f9433926a081f1ce45992fd78d52
-
SHA256
fdc722e137881d7e37dc7cd3a58a6112ead7076e4c4d42ddec29f3cd8d0badc8
-
SHA512
a1ca3b16223d9f732f29cd14860ea531b2128931e5400102a046e3cfbec35c5b823da95fe0cfb57b66a4166ea7280d38f1be925a36e56b41acb609d82f16b207
-
SSDEEP
12288:xgFNa30x0Yk2YydFP82pAnFZsN7D7Tbeo8JFkFc1:sNa9D2YydpaFW2XJFkE
Malware Config
Signatures
Files
-
fdc722e137881d7e37dc7cd3a58a6112ead7076e4c4d42ddec29f3cd8d0badc8.dll windows x86
67995367404935015ec20b65052811d5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
FixBrushOrgEx
CloseMetaFile
CreateMetaFileW
DeleteMetaFile
EngCreatePalette
GdiEntry5
GetETM
GetRelAbs
RestoreDC
SaveDC
SetDIBitsToDevice
SetWindowExtEx
SetWindowOrgEx
CreateEllipticRgnIndirect
CreateFontIndirectW
DeleteObject
EngGetPrinterDataFileName
GetDeviceCaps
GetEnhMetaFileDescriptionW
GetLayout
GetObjectW
GetStockObject
OffsetWindowOrgEx
SetBkMode
SetTextColor
CloseFigure
FlattenPath
GdiCreateLocalEnhMetaFile
CLIPOBJ_ppoGetPath
EngGetDriverName
ExtCreateRegion
GetTransform
SelectObject
EngGradientFill
CreateDCA
DeleteEnhMetaFile
DeviceCapabilitiesExW
EndDoc
FONTOBJ_cGetAllGlyphHandles
GdiEntry14
Polyline
CreateRoundRectRgn
EngQueryLocalTime
GetGlyphOutlineA
TextOutW
GetTextFaceW
CreateColorSpaceA
EnumMetaFile
GetFontUnicodeRanges
GetRgnBox
InvertRgn
STROBJ_dwGetCodePage
XLATEOBJ_iXlate
kernel32
DisableThreadLibraryCalls
HeapDestroy
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
lstrcpyA
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
CopyFileExA
FreeLibrary
FreeLibraryAndExitThread
GetComputerNameExW
GetCurrentThread
GetProcAddress
GlobalAlloc
GlobalLock
GlobalUnlock
IsBadStringPtrW
LoadLibraryW
OutputDebugStringW
Process32NextW
QueryDosDeviceA
TerminateJobObject
Toolhelp32ReadProcessMemory
UnmapViewOfFile
lstrcmpiW
VirtualAlloc
BuildCommDCBA
CancelIo
CreateSemaphoreW
EnumUILanguagesW
GetLocaleInfoW
GetOverlappedResult
GetThreadPriorityBoost
LocalAlloc
LocalFree
Process32First
ReadFile
WaitForSingleObject
lstrcatW
lstrcpyW
FormatMessageA
GetCurrentProcess
IsBadReadPtr
IsBadWritePtr
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
CloseHandle
FindResourceW
FreeResource
GetFileSize
GetSystemTime
GlobalFree
LoadResource
LockResource
SetMessageWaitingIndicator
SetVolumeMountPointW
CopyFileW
CreateEventA
DeleteFileW
FormatMessageW
GetCurrentDirectoryW
GetCurrentThreadId
GetFileAttributesW
GetFullPathNameA
GetLogicalDriveStringsW
GetTempFileNameW
GetTempPathW
GetTickCount
GetVolumePathNameA
InterlockedExchangeAdd
LocalSize
Module32First
Module32Next
MulDiv
SetEvent
Thread32Next
lstrcmpW
GetDateFormatW
SetThreadPriority
Sleep
EnumTimeFormatsW
ExpandEnvironmentStringsW
GetModuleHandleA
GetModuleHandleW
GetSystemTimeAdjustment
GetVolumeInformationW
GetWindowsDirectoryW
GlobalFix
OutputDebugStringA
SetComputerNameW
SetProcessWorkingSetSize
CreateEventW
GetCommModemStatus
GetExitCodeThread
LocalFlags
Beep
ContinueDebugEvent
EnumSystemCodePagesA
GetConsoleAliasExesA
GetCurrentProcessId
GetNamedPipeHandleStateA
GetPrivateProfileSectionW
GetSystemTimeAsFileTime
InterlockedCompareExchange
InterlockedExchange
QueryPerformanceCounter
RemoveDirectoryA
SetTimeZoneInformation
WriteProfileSectionW
_lclose
CopyFileA
CreateFileW
SetFilePointer
WriteFile
DnsHostnameToComputerNameA
FindVolumeClose
GetProcessHeap
IsBadStringPtrA
RegisterWaitForSingleObject
SetConsoleWindowInfo
SetThreadContext
SleepEx
UnregisterWaitEx
CompareStringA
GetCPInfo
GetLastError
CompareStringW
HeapFree
HeapAlloc
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
ExitProcess
GetConsoleCP
ReadConsoleInputA
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
RtlUnwind
ExitThread
CreateThread
GetModuleFileNameA
FindFirstFileA
FindNextFileA
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
HeapReAlloc
GetFileAttributesA
SetFileAttributesA
FlushFileBuffers
GetDriveTypeA
GetLocalTime
SetLocalTime
MoveFileW
CreateFileA
WriteConsoleW
GetStdHandle
GetModuleFileNameW
SetFileAttributesW
GetCommandLineA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLocaleInfoA
IsDebuggerPresent
HeapSize
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
FatalAppExitA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
WriteConsoleA
GetConsoleOutputCP
SetConsoleCtrlHandler
LoadLibraryA
InitializeCriticalSectionAndSpinCount
PeekConsoleInputA
GetNumberOfConsoleInputEvents
FileTimeToSystemTime
FileTimeToLocalFileTime
SetEndOfFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetExitCodeProcess
CreateProcessA
CreateProcessW
SetEnvironmentVariableW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoTestCancel
CreateDataAdviseHolder
HGLOBAL_UserFree
DoDragDrop
OleCreateLinkToFile
STGMEDIUM_UserMarshal
StgCreateDocfile
StgIsStorageFile
OleCreate
CoMarshalInterThreadInterfaceInStream
CoQueryProxyBlanket
CoTaskMemAlloc
CreateDataCache
HENHMETAFILE_UserUnmarshal
MonikerRelativePathTo
OleNoteObjectVisible
OleRun
ProgIDFromCLSID
StgOpenAsyncDocfileOnIFillLockBytes
StringFromCLSID
HBITMAP_UserSize
OleSetMenuDescriptor
HGLOBAL_UserMarshal
OleCreateDefaultHandler
CoAllowSetForegroundWindow
CoGetCallContext
HMETAFILEPICT_UserUnmarshal
OleCreateFromFileEx
OleRegGetMiscStatus
OleUninitialize
ReadOleStg
Exports
Exports
Sections
.text Size: 449KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ