Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    202s
  • max time network
    205s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 23:24

General

  • Target

    Utsysc.exe

  • Size

    5.4MB

  • MD5

    42adcf27247e2f9324ded079d3b52613

  • SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

  • SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

  • SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • SSDEEP

    98304:sIk4EA1UcVPv/GTBiktXL4f7sFjhB7PIf119llL2o+PifA73QHERfgu+rpzTPXp/:sjAaoLS67sFjh6d1Dco+N3ghrVXEq

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 29 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Utsysc.exe
    "C:\Users\Admin\AppData\Local\Temp\Utsysc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2256
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0145C6C4-99D5-4AA0-8E4A-45AE09B9F679} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2404
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1776
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • \Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • \Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.4MB

    MD5

    42adcf27247e2f9324ded079d3b52613

    SHA1

    51793943f7803bdbbb569448c83ca284dc7cb273

    SHA256

    650513f90b4b88bd0c4564016b87b00db1999c1f281cce6a6e8718bfaa5d8ab9

    SHA512

    7ca2a7bb790e64fac47333bea915f736f0b09dcf6155cc6d02cc28b1087ef19ea72b5fa770fd43c9a2dad7d032b5dfd7e21f38ef1c2c9897ce5c6c64c5927334

  • memory/1696-51-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-56-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-19-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1696-21-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1696-24-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1696-26-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1696-29-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/1696-31-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/1696-39-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-38-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-40-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-41-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-43-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-42-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-44-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/1696-45-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-47-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-46-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-49-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-50-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-48-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-53-0x0000000076FF0000-0x0000000076FF2000-memory.dmp

    Filesize

    8KB

  • memory/1696-14-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1696-52-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-54-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-55-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-57-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-16-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1696-9-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1696-11-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1696-64-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-70-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-7-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1696-75-0x0000000004DA0000-0x0000000005B47000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-76-0x0000000004DA0000-0x0000000005B47000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-3-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/1696-78-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/1696-74-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1696-6-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/1696-1-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/1696-0-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1696-4-0x0000000000310000-0x00000000010B7000-memory.dmp

    Filesize

    13.7MB

  • memory/1776-259-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-257-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-255-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/1776-253-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-252-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-250-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-251-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-244-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/1776-212-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/1776-267-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/1776-266-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/1776-265-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2404-185-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-194-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-204-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-205-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/2404-203-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2404-196-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-197-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-199-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-192-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/2404-190-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-145-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2404-148-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2404-184-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-188-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-186-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-187-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-122-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/2708-124-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-141-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-127-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-140-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-139-0x0000000076800000-0x0000000076847000-memory.dmp

    Filesize

    284KB

  • memory/2708-138-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-135-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2708-125-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-129-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-121-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-119-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-118-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-117-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-116-0x0000000074B10000-0x0000000074C20000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-97-0x0000000000F00000-0x0000000000F01000-memory.dmp

    Filesize

    4KB

  • memory/2708-94-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

    Filesize

    4KB

  • memory/2708-92-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

    Filesize

    4KB

  • memory/2708-89-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

    Filesize

    4KB

  • memory/2708-87-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

    Filesize

    4KB

  • memory/2708-84-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2708-81-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB

  • memory/2708-82-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2708-77-0x0000000000130000-0x0000000000ED7000-memory.dmp

    Filesize

    13.7MB