Static task
static1
Behavioral task
behavioral1
Sample
With Your Destiny.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
With Your Destiny.exe
Resource
win10v2004-20240226-en
General
-
Target
With Your Destiny.exe
-
Size
384KB
-
MD5
e8149c57d44fa89d99710ce794ba982a
-
SHA1
f65c2ba0525edc875fbe13d6d5b461d2040e9ff5
-
SHA256
f8586a68e494ea964f76da6b614d50072844c9963fb39bf214f287ca70f32f9e
-
SHA512
88c11c65b991d1194dd552d8d8c3e195c47e9243c450b8d767c1bf237a667fc7ca62e73faa5b2c643522edb9cbe8e540b91e4dcd9ecdfddfb6df9f28ada4b367
-
SSDEEP
6144:IZzvhs2Z4n1E7g34XtVYAOfTddgaKcLStvhNsagUW:IJ+2Z4nShVY5zKcglgUW
Malware Config
Signatures
Files
-
With Your Destiny.exe.exe windows:6 windows x86 arch:x86
a99648a4d417f4130faca9d4625edb8e
Code Sign
6f:94:a8:ba:18:8a:0c:e2:59:bf:ce:1b:0f:16:71:06:ef:36:62:85Certificate
IssuerCN=Raid Hut Games,OU=Unidade de desenvolvimento e publicação,O=Raid Hut Games,L=Recife,ST=Pernambuco,C=BR,1.2.840.113549.1.9.1=#0c1368656c7040726169646875742e636f6d2e6272Not Before29/05/2019, 20:00Not After24/05/2039, 20:00SubjectCN=Raid Hut Games,OU=Unidade de desenvolvimento e publicação,O=Raid Hut Games,L=Recife,ST=Pernambuco,C=BR,1.2.840.113549.1.9.1=#0c1368656c7040726169646875742e636f6d2e627245:71:b7:c2:7f:e8:26:b7:0f:d3:dd:b5:b8:ea:6e:11:36:ee:cf:3fSigner
Actual PE Digest45:71:b7:c2:7f:e8:26:b7:0f:d3:dd:b5:b8:ea:6e:11:36:ee:cf:3fDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\ani\code\squirrel\squirrel.windows\build\Release\Win32\StubExecutable.pdb
Imports
kernel32
GetModuleFileNameW
GetModuleHandleW
FindFirstFileW
FindNextFileW
FindClose
CreateProcessW
CreateFileW
CloseHandle
WideCharToMultiByte
GetLastError
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
SetFilePointerEx
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
WriteConsoleW
user32
AllowSetForegroundWindow
WaitForInputIdle
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ