Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
202s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 23:24
Behavioral task
behavioral1
Sample
Utsysc.exe
Resource
win7-20231020-en
General
-
Target
Utsysc.exe
-
Size
5.4MB
-
MD5
42adcf27247e2f9324ded079d3b52613
-
SHA1
51793943f7803bdbbb569448c83ca284dc7cb273
-
SHA256
650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
-
SHA512
7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
SSDEEP
98304:sIk4EA1UcVPv/GTBiktXL4f7sFjhB7PIf119llL2o+PifA73QHERfgu+rpzTPXp/:sjAaoLS67sFjh6d1Dco+N3ghrVXEq
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe -
Executes dropped EXE 4 IoCs
pid Process 2708 Utsysc.exe 2404 Utsysc.exe 1776 Utsysc.exe 1744 Utsysc.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 Utsysc.exe 1696 Utsysc.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-4-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-46-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-48-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-51-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-54-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-55-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-57-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-56-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/files/0x00310000000144a1-65.dat themida behavioral1/files/0x00310000000144a1-69.dat themida behavioral1/memory/1696-64-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/memory/1696-70-0x0000000000310000-0x00000000010B7000-memory.dmp themida behavioral1/files/0x00310000000144a1-63.dat themida behavioral1/memory/1696-76-0x0000000004DA0000-0x0000000005B47000-memory.dmp themida behavioral1/memory/2708-77-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/files/0x00310000000144a1-62.dat themida behavioral1/memory/2708-81-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/files/0x00310000000144a1-133.dat themida behavioral1/memory/2708-135-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/files/0x00310000000144a1-144.dat themida behavioral1/memory/2404-145-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/memory/2404-148-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/memory/2404-203-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/files/0x00310000000144a1-211.dat themida behavioral1/memory/1776-212-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/memory/1776-244-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/memory/1776-265-0x0000000000130000-0x0000000000ED7000-memory.dmp themida behavioral1/files/0x00310000000144a1-274.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1696 Utsysc.exe 2708 Utsysc.exe 2404 Utsysc.exe 1776 Utsysc.exe 1744 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2256 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1696 Utsysc.exe 1696 Utsysc.exe 2708 Utsysc.exe 2708 Utsysc.exe 2404 Utsysc.exe 2404 Utsysc.exe 1776 Utsysc.exe 1776 Utsysc.exe 1744 Utsysc.exe 1744 Utsysc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 Utsysc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2708 1696 Utsysc.exe 28 PID 1696 wrote to memory of 2708 1696 Utsysc.exe 28 PID 1696 wrote to memory of 2708 1696 Utsysc.exe 28 PID 1696 wrote to memory of 2708 1696 Utsysc.exe 28 PID 2708 wrote to memory of 2256 2708 Utsysc.exe 29 PID 2708 wrote to memory of 2256 2708 Utsysc.exe 29 PID 2708 wrote to memory of 2256 2708 Utsysc.exe 29 PID 2708 wrote to memory of 2256 2708 Utsysc.exe 29 PID 2372 wrote to memory of 2404 2372 taskeng.exe 36 PID 2372 wrote to memory of 2404 2372 taskeng.exe 36 PID 2372 wrote to memory of 2404 2372 taskeng.exe 36 PID 2372 wrote to memory of 2404 2372 taskeng.exe 36 PID 2372 wrote to memory of 1776 2372 taskeng.exe 37 PID 2372 wrote to memory of 1776 2372 taskeng.exe 37 PID 2372 wrote to memory of 1776 2372 taskeng.exe 37 PID 2372 wrote to memory of 1776 2372 taskeng.exe 37 PID 2372 wrote to memory of 1744 2372 taskeng.exe 38 PID 2372 wrote to memory of 1744 2372 taskeng.exe 38 PID 2372 wrote to memory of 1744 2372 taskeng.exe 38 PID 2372 wrote to memory of 1744 2372 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\Utsysc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2256
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0145C6C4-99D5-4AA0-8E4A-45AE09B9F679} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334
-
Filesize
5.4MB
MD542adcf27247e2f9324ded079d3b52613
SHA151793943f7803bdbbb569448c83ca284dc7cb273
SHA256650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9
SHA5127ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334