Static task
static1
Behavioral task
behavioral1
Sample
Titan_Spoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Titan_Spoofer.exe
Resource
win10v2004-20240226-en
General
-
Target
Titan_Spoofer.exe
-
Size
34.7MB
-
MD5
c9664ad72267f16bbdd1018641bdd2bd
-
SHA1
d1bb1119bdd1b574e6658af947d3a3deece81a8a
-
SHA256
86d0e8c7ceb3a7cdd08b893543c26b5f30aac161b6dd357961587fa16669c70e
-
SHA512
c5ad92d51e298dd4361f95769cb2c7aa79459cb7e3a1a49e8f6e695ae6f9418de2f8d5858d095fdec7e0793ad5f22f76a2b18b298d999ae1006c7d6cc3ad9edc
-
SSDEEP
49152:LGtlqgwIU6ibBQIuQAdwhZA48rh2DB46Gue8ut0iSsVgd/mLdPRdadgvXhiPY+vZ:W+bFZZA48rCnIh5L5PcSRn+vt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Titan_Spoofer.exe
Files
-
Titan_Spoofer.exe.exe windows:6 windows x64 arch:x64
8cf31d8163c6760442d6eeceb2220d99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
select
__WSAFDIsSet
inet_pton
shutdown
WSASetLastError
bind
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAGetLastError
wldap32
ord45
ord211
ord60
ord50
ord46
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
crypt32
CryptQueryObject
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
kernel32
ExitThread
CreateThread
FileTimeToSystemTime
FreeLibraryAndExitThread
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
ExitProcess
SetFilePointerEx
SetConsoleCtrlHandler
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
FlsAlloc
FlsGetValue
GetLocaleInfoW
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DeleteFileW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FlushFileBuffers
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
WriteConsoleW
SystemTimeToTzSpecificLocalTime
InitializeCriticalSectionAndSpinCount
VirtualProtect
HeapFree
SetConsoleTextAttribute
SetConsoleTitleA
GetCurrentProcess
GetStdHandle
InitializeCriticalSectionEx
HeapSize
Sleep
GetLastError
HeapReAlloc
CloseHandle
HeapAlloc
DecodePointer
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
AllocConsole
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
RtlUnwind
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
FormatMessageW
WriteFile
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
VirtualQuery
VirtualAlloc
GetSystemInfo
LoadLibraryExW
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
SleepConditionVariableSRW
WakeAllConditionVariable
RaiseException
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetStringTypeW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EncodePointer
LCMapStringEx
user32
FindWindowA
MessageBoxA
GetUserObjectInformationW
ShowWindow
GetProcessWindowStation
MessageBoxW
shell32
ShellExecuteA
ShellExecuteW
userenv
UnloadUserProfile
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
bcrypt
BCryptGenRandom
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 781KB - Virtual size: 781KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 31.5MB - Virtual size: 31.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ