Overview
overview
10Static
static
10Velocity 713.7z
windows7-x64
3Velocity 713.7z
windows10-2004-x64
3Velocity 7...I2.dll
windows7-x64
1Velocity 7...I2.dll
windows10-2004-x64
1Velocity 7...er.exe
windows7-x64
10Velocity 7...er.exe
windows10-2004-x64
10Velocity 713/key.txt
windows7-x64
1Velocity 713/key.txt
windows10-2004-x64
1Velocity 7...er.exe
windows7-x64
10Velocity 7...er.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 01:10
Behavioral task
behavioral1
Sample
Velocity 713.7z
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Velocity 713.7z
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Velocity 713/Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Velocity 713/Guna.UI2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Velocity 713/Velocity Spoofer.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Velocity 713/Velocity Spoofer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Velocity 713/key.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Velocity 713/key.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Velocity 713/velocity spoofer.exe
Resource
win7-20240708-en
General
-
Target
Velocity 713/velocity spoofer.exe
-
Size
19.6MB
-
MD5
0043cb93d8ff5d31698fc8682905ed21
-
SHA1
91579a84f56c6850e9e996508f86cccccbca6744
-
SHA256
e1b9f69a162f2d05059269bc8da64c6f1d1f799e8da5010545b2f490f6a370b4
-
SHA512
d61683d0d72403e6d88b8e678c2b3834790611a587a4b7f043d0ddec9619c03aa9293afd16f71a442133ccb793fa0fe5975066a1f0817d19b835683b472a9471
-
SSDEEP
393216:u4qMf3RuoaX5L7nFv2TGIlkeBqkRbfxL9tMtbmE/WUnwbZSDU:uPMvRU1rl+GxeBqkltMtV/WUnwbZ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral10/memory/3692-16-0x0000000006C00000-0x0000000006E12000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ velocity spoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion velocity spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion velocity spoofer.exe -
resource yara_rule behavioral10/memory/3692-11-0x0000000000400000-0x0000000001D1E000-memory.dmp themida behavioral10/memory/3692-12-0x0000000000400000-0x0000000001D1E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA velocity spoofer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3692 velocity spoofer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS velocity spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer velocity spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion velocity spoofer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3692 velocity spoofer.exe 3692 velocity spoofer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3692 velocity spoofer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Velocity 713\velocity spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Velocity 713\velocity spoofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692