Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 03:12
Behavioral task
behavioral1
Sample
ed76e28db12ac8bd2a0f1659b2d9e29a.exe
Resource
win7-20231023-en
General
-
Target
ed76e28db12ac8bd2a0f1659b2d9e29a.exe
-
Size
5.5MB
-
MD5
ed76e28db12ac8bd2a0f1659b2d9e29a
-
SHA1
b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
-
SHA256
bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
-
SHA512
950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
SSDEEP
98304:vYj/yTZFk1J+TpnFZ5rgtk16tg4S8S4r350hG4Jujy18U/44M8b1Cm2urASeaHun:v4/yTZq1JCdFZ5+kgSU3mhGkdL4u1CmG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed76e28db12ac8bd2a0f1659b2d9e29a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed76e28db12ac8bd2a0f1659b2d9e29a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed76e28db12ac8bd2a0f1659b2d9e29a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe -
Executes dropped EXE 4 IoCs
pid Process 2640 Utsysc.exe 1020 Utsysc.exe 1544 Utsysc.exe 2584 Utsysc.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe -
resource yara_rule behavioral1/memory/2380-0-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-3-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-32-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-52-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-53-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-54-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-55-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-56-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-57-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2380-58-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/files/0x00080000000120bd-63.dat themida behavioral1/files/0x00080000000120bd-64.dat themida behavioral1/files/0x00080000000120bd-65.dat themida behavioral1/files/0x00080000000120bd-70.dat themida behavioral1/memory/2380-69-0x00000000013B0000-0x0000000002247000-memory.dmp themida behavioral1/memory/2640-76-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/memory/2640-80-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/files/0x00080000000120bd-139.dat themida behavioral1/files/0x00080000000120bd-140.dat themida behavioral1/memory/1020-142-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/memory/1020-147-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/memory/2640-180-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/memory/1020-203-0x0000000000860000-0x00000000016F7000-memory.dmp themida behavioral1/files/0x00080000000120bd-217.dat themida behavioral1/files/0x00080000000120bd-313.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ed76e28db12ac8bd2a0f1659b2d9e29a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 2640 Utsysc.exe 1020 Utsysc.exe 1544 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 2640 Utsysc.exe 2640 Utsysc.exe 1020 Utsysc.exe 1020 Utsysc.exe 1544 Utsysc.exe 1544 Utsysc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2640 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 28 PID 2380 wrote to memory of 2640 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 28 PID 2380 wrote to memory of 2640 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 28 PID 2380 wrote to memory of 2640 2380 ed76e28db12ac8bd2a0f1659b2d9e29a.exe 28 PID 2640 wrote to memory of 2124 2640 Utsysc.exe 29 PID 2640 wrote to memory of 2124 2640 Utsysc.exe 29 PID 2640 wrote to memory of 2124 2640 Utsysc.exe 29 PID 2640 wrote to memory of 2124 2640 Utsysc.exe 29 PID 1492 wrote to memory of 1020 1492 taskeng.exe 34 PID 1492 wrote to memory of 1020 1492 taskeng.exe 34 PID 1492 wrote to memory of 1020 1492 taskeng.exe 34 PID 1492 wrote to memory of 1020 1492 taskeng.exe 34 PID 1492 wrote to memory of 1544 1492 taskeng.exe 37 PID 1492 wrote to memory of 1544 1492 taskeng.exe 37 PID 1492 wrote to memory of 1544 1492 taskeng.exe 37 PID 1492 wrote to memory of 1544 1492 taskeng.exe 37 PID 1492 wrote to memory of 2584 1492 taskeng.exe 38 PID 1492 wrote to memory of 2584 1492 taskeng.exe 38 PID 1492 wrote to memory of 2584 1492 taskeng.exe 38 PID 1492 wrote to memory of 2584 1492 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed76e28db12ac8bd2a0f1659b2d9e29a.exe"C:\Users\Admin\AppData\Local\Temp\ed76e28db12ac8bd2a0f1659b2d9e29a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2124
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {03484A9A-DEB8-44AE-B0A4-5A8182DE8738} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Executes dropped EXE
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
1.7MB
MD5468fd865d5f4f63c16995106440edae0
SHA1865cc8919bb192ea230749ac23ab77f00d4c618d
SHA256a85e0b255ff83a6d13b28e91066f7ea68ac7336184620320e0132f08f068fc26
SHA512ce4d46d358c7f6b26b04929cd84a9f71f74e40965151322319ed5cd228ad9eb613f75d751dd39dfe64f38f9ba3648ef04149f4f5f5808ace67a96a2134f5d2f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1
-
Filesize
5.5MB
MD5ed76e28db12ac8bd2a0f1659b2d9e29a
SHA1b179d7aafb3bc8a9bf0e59bb5dd989bedd92818c
SHA256bfc5144d4350c7295d7749470264d1eba81647ecb3ad060fd5d1b829653e04bf
SHA512950c8000edcdab4ab941151dbf8e1112f92591a6b67be241d7746d5be48579d695952a46beab2c0c458c2c86e85de7cff110d451322fb5ce3139f2e5538a60f1