Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 19:48
Behavioral task
behavioral1
Sample
TFT_SERVER.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TFT_SERVER.exe
Resource
win10v2004-20250314-en
General
-
Target
TFT_SERVER.exe
-
Size
13.9MB
-
MD5
367eed9cd88ac6c7b85d81640b028e74
-
SHA1
4cb2fcc17d94065c44b8989c3cb83887059d552b
-
SHA256
b28f01c902ee902205c5fd1486983991d54f5ee90024a82e4c516eede2c46ae7
-
SHA512
cbc75068c05cbcddd9920e11aa017b0bd60cd171dd89bfa3cce4c27fdc3913e8ed9863d56b8040e2b2fcfc9e6d71ad84c2659f2a0ecc3ef21dfec5a211c582fe
-
SSDEEP
196608:t6ST+pvtSR8WKZp3EhpLpTslFV9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDubbjY:r8p3E3pslFVkYVI5DK2NNs6LtYdEhSp
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TFT_SERVER.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TFT_SERVER.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TFT_SERVER.exe -
Loads dropped DLL 1 IoCs
pid Process 3188 TFT_SERVER.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3188-1-0x0000000000580000-0x0000000001376000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x0007000000024306-7.dat themida behavioral2/memory/3188-10-0x0000000071F30000-0x0000000072510000-memory.dmp themida behavioral2/memory/3188-13-0x0000000071F30000-0x0000000072510000-memory.dmp themida behavioral2/memory/3188-14-0x0000000071F30000-0x0000000072510000-memory.dmp themida behavioral2/memory/3188-17-0x0000000071F30000-0x0000000072510000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TFT_SERVER.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TFT_SERVER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TFT_SERVER.exe"C:\Users\Admin\AppData\Local\Temp\TFT_SERVER.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD55f449db8083ca4060253a0b4f40ff8ae
SHA12b77b8c86fda7cd13d133c93370ff302cd08674b
SHA2567df49cba50cc184b0fbb31349bd9f2b18acf5f7e7fac9670759efa48564eaef1
SHA5124ce668cf2391422ef37963a5fd6c6251d414f63545efb3f1facb77e4695cd5a8af347bd77fc2bebfa7fd3ef10ff413a7acfde32957037a51c59806577351825f