titan_radiant.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9.exe
Resource
win10v2004-20240709-en
General
-
Target
2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9
-
Size
1.6MB
-
MD5
1c0bc961ccb5a371fb015bfe02fc221a
-
SHA1
b42c701ece191b33873fbc23d3a3ddb76e3f8c58
-
SHA256
2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9
-
SHA512
6f5fbe7defdb40fe13233cd6510b95b3e132b5934f169126342a3f23e1f9eaf0ec7b9779879b8b8dc7a9dd303b70e4cec559d68e94de9f43df51de617254cf9a
-
SSDEEP
24576:zy61D7T+mhh4HSlipmuQAOxe6ldOPv8ZYkpf2ePG3I9vzz4X9v6Qn652QOq:zy61D7bhhu6H26ldO5e7PGNtZq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9
Files
-
2f32d962d309bfa40d4962d9bb209fae64450ad81f76197dba0ee50a666a7ce9.exe windows:6 windows x64 arch:x64
edb60e21c0b6bf17f3d6c9b658acd221
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressSingle
WakeByAddressAll
bcryptprimitives
ProcessPrng
kernel32
GetQueuedCompletionStatusEx
IsDebuggerPresent
LoadLibraryExW
PostQueuedCompletionStatus
InitializeSListHead
UnhandledExceptionFilter
CreateIoCompletionPort
GetCurrentThreadId
RtlPcToFileHeader
HeapFree
GetSystemTimeAsFileTime
CopyFileExW
SetUnhandledExceptionFilter
SetHandleInformation
GetStdHandle
GetConsoleMode
IsProcessorFeaturePresent
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
CreateWaitableTimerExW
Sleep
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetEnvironmentVariableW
GetModuleFileNameW
GetFullPathNameW
CreateDirectoryW
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFinalPathNameByHandleW
RtlUnwindEx
TerminateProcess
SwitchToThread
CreateThread
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcessId
CreateMutexA
ReleaseMutex
WideCharToMultiByte
RtlVirtualUnwind
SetEnvironmentVariableW
GetSystemInfo
EncodePointer
RaiseException
FreeLibrary
CloseHandle
HeapReAlloc
GetCurrentThread
SetThreadStackGuarantee
SetLastError
SetWaitableTimer
SetFileCompletionNotificationModes
AddVectoredExceptionHandler
GetSystemTimePreciseAsFileTime
FlushInstructionCache
WriteProcessMemory
GetProcAddress
GetModuleHandleA
GetCurrentProcess
FindClose
FindNextFileW
FindFirstFileW
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLastError
ntdll
NtProtectVirtualMemory
NtWriteVirtualMemory
NtCancelIoFileEx
NtAllocateVirtualMemory
RtlNtStatusToDosError
NtDeviceIoControlFile
NtCreateFile
NtWaitForSingleObject
NtCreateThreadEx
NtWriteFile
oleaut32
SysFreeString
GetErrorInfo
SysStringLen
SysAllocStringLen
ole32
CoInitializeEx
CoCreateInstance
CoTaskMemFree
shell32
SHGetKnownFolderPath
ws2_32
shutdown
WSASend
getsockname
WSAGetLastError
getsockopt
closesocket
bind
WSAIoctl
setsockopt
ioctlsocket
WSASocketW
getaddrinfo
getpeername
freeaddrinfo
WSACleanup
recv
send
connect
WSAStartup
bcrypt
BCryptGenRandom
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SystemFunction036
crypt32
CertDuplicateStore
CertDuplicateCertificateContext
CertCloseStore
CertFreeCertificateContext
CertOpenStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertGetCertificateChain
CertAddCertificateContextToStore
CertEnumCertificatesInStore
CertDuplicateCertificateChain
secur32
EncryptMessage
DecryptMessage
QueryContextAttributesW
InitializeSecurityContextW
AcquireCredentialsHandleA
ApplyControlToken
FreeContextBuffer
DeleteSecurityContext
FreeCredentialsHandle
AcceptSecurityContext
api-ms-win-crt-math-l1-1-0
pow
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
_configure_narrow_argv
_cexit
_c_exit
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
__p___argv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_initterm_e
abort
exit
_exit
__p___argc
_register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
calloc
malloc
api-ms-win-crt-string-l1-1-0
strcpy_s
wcsncmp
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 448KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ