Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
27/03/2025, 19:45
Behavioral task
behavioral1
Sample
TFT_SERVER.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
TFT_SERVER.exe
-
Size
13.9MB
-
MD5
367eed9cd88ac6c7b85d81640b028e74
-
SHA1
4cb2fcc17d94065c44b8989c3cb83887059d552b
-
SHA256
b28f01c902ee902205c5fd1486983991d54f5ee90024a82e4c516eede2c46ae7
-
SHA512
cbc75068c05cbcddd9920e11aa017b0bd60cd171dd89bfa3cce4c27fdc3913e8ed9863d56b8040e2b2fcfc9e6d71ad84c2659f2a0ecc3ef21dfec5a211c582fe
-
SSDEEP
196608:t6ST+pvtSR8WKZp3EhpLpTslFV9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDubbjY:r8p3E3pslFVkYVI5DK2NNs6LtYdEhSp
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TFT_SERVER.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TFT_SERVER.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TFT_SERVER.exe -
Loads dropped DLL 1 IoCs
pid Process 3092 TFT_SERVER.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/3092-1-0x0000000000740000-0x0000000001536000-memory.dmp agile_net -
resource yara_rule behavioral1/files/0x0007000000028239-7.dat themida behavioral1/memory/3092-11-0x0000000072100000-0x00000000726E0000-memory.dmp themida behavioral1/memory/3092-13-0x0000000072100000-0x00000000726E0000-memory.dmp themida behavioral1/memory/3092-14-0x0000000072100000-0x00000000726E0000-memory.dmp themida behavioral1/memory/3092-18-0x0000000072100000-0x00000000726E0000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TFT_SERVER.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TFT_SERVER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TFT_SERVER.exe"C:\Users\Admin\AppData\Local\Temp\TFT_SERVER.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD55f449db8083ca4060253a0b4f40ff8ae
SHA12b77b8c86fda7cd13d133c93370ff302cd08674b
SHA2567df49cba50cc184b0fbb31349bd9f2b18acf5f7e7fac9670759efa48564eaef1
SHA5124ce668cf2391422ef37963a5fd6c6251d414f63545efb3f1facb77e4695cd5a8af347bd77fc2bebfa7fd3ef10ff413a7acfde32957037a51c59806577351825f