Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1Evon/Evon.dll
windows7-x64
1Evon/Evon.dll
windows10-2004-x64
3Evon/Evon.exe
windows7-x64
1Evon/Evon.exe
windows10-2004-x64
6Evon/FluxAPI.dll
windows7-x64
1Evon/FluxAPI.dll
windows10-2004-x64
1Evon/KrnlAPI.dll
windows7-x64
1Evon/KrnlAPI.dll
windows10-2004-x64
1Evon/Oxygen API.dll
windows7-x64
1Evon/Oxygen API.dll
windows10-2004-x64
1Evon/runti...er.dll
windows7-x64
1Evon/runti...er.dll
windows10-2004-x64
1Evon/runti...er.dll
windows7-x64
3Evon/runti...er.dll
windows10-2004-x64
3Evon/runti...er.dll
windows7-x64
1Evon/runti...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
Evon/Evon.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Evon/Evon.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Evon/Evon.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Evon/Evon.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Evon/FluxAPI.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Evon/FluxAPI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Evon/KrnlAPI.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Evon/KrnlAPI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Evon/Oxygen API.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Evon/Oxygen API.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Evon/runtimes/win-arm64/native/WebView2Loader.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Evon/runtimes/win-arm64/native/WebView2Loader.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Evon/runtimes/win-x64/native/WebView2Loader.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Evon/runtimes/win-x64/native/WebView2Loader.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Evon/runtimes/win-x86/native/WebView2Loader.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Evon/runtimes/win-x86/native/WebView2Loader.dll
Resource
win10v2004-20230221-en
General
-
Target
Evon/Evon.exe
-
Size
6.4MB
-
MD5
8a3a3c1c0ff62fab204c8e6e76e477a7
-
SHA1
50fde23d977cc384eec65b4dc20e6c76749a1208
-
SHA256
b5d324e31f58cb59eaeecbbb4f743ca474f7acefd1326ded5ae2c77866f55238
-
SHA512
20705142e476d7ee1f3d6133020a74b42fcb12c1513b4d4ef28ca254226802a6926b90dcf18f673af47b964ceca7a26674307ecf5500b4e41a7a047a31718169
-
SSDEEP
98304:6FmsG+4eOpS9qWNXNgCp6aGBwHCcmmxVA5/xDnLx0yu+5TpUz:yDGw9f92CnPhATd0yHg
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 1224 msedge.exe 1224 msedge.exe 1320 Evon.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 Evon.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1320 Evon.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1224 1320 Evon.exe 86 PID 1320 wrote to memory of 1224 1320 Evon.exe 86 PID 1224 wrote to memory of 3332 1224 msedge.exe 87 PID 1224 wrote to memory of 3332 1224 msedge.exe 87 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 3244 1224 msedge.exe 89 PID 1224 wrote to memory of 4996 1224 msedge.exe 90 PID 1224 wrote to memory of 4996 1224 msedge.exe 90 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92 PID 1224 wrote to memory of 3412 1224 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Evon\Evon.exe"C:\Users\Admin\AppData\Local\Temp\Evon\Evon.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/YpXFb3xUqz2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffebab446f8,0x7ffebab44708,0x7ffebab447183⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:23⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2996 /prefetch:83⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:13⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:13⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:13⤵PID:2280
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50820611471c1bb55fa7be7430c7c6329
SHA15ce7a9712722684223aced2522764c1e3a43fbb9
SHA256f00d04749a374843bd118b41f669f8b0a20d76526c34b554c3ccac5ebd2f4f75
SHA51277ea022b4265f3962f5e07a0a790f428c885da0cc11be0975285ce0eee4a2eec0a7cda9ea8f366dc2a946679b5dd927c5f94b527de6515856b68b8d08e435148
-
Filesize
152B
MD5425e83cc5a7b1f8edfbec7d986058b01
SHA1432a90a25e714c618ff30631d9fdbe3606b0d0df
SHA256060a2e5f65b8f3b79a8d4a0c54b877cfe032f558beb0888d6f810aaeef8579bd
SHA5124bf074de60e7849ade26119ef778fe67ea47691efff45f3d5e0b25de2d06fcc6f95a2cfcdbed85759a5c078bb371fe57de725babda2f44290b4dc42d7b6001af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5aca502641721eca90b81612d801b06d1
SHA1ca65a24de6f375bd9a3c2d92dcd9dd6bd21ae71a
SHA25617614e086e7b6b1196570f74920257e291f2659d4a71a41190f3018d36298241
SHA5123bc1521ad27d4ee871e90e2de6e92e55b6f7360d50ca4f64210536221e25eacfeebc1dc35929393a811d6c8c9a9c79bf428d7345211d33da36aae138f776fa02
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe56dc1c.TMP
Filesize48B
MD57f1294e9ae3d49a6561f17dbec49eb77
SHA111470b8ea5475da1a2abcd8c4d8cf0ce8a26b17c
SHA256666502462e1f6a4bcd36602e6f9fae0beb9a9f48dcafc74c5994463aeff51ea3
SHA512e545585cef544604063ce88952f9d26163651aefe3f9239648f19634f8a324f101a46a5aaef7b0f87f356d4c3cc5c0b2ec039bbf7826e6309d597c83550dc96e
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD5efddc4b4da454548d752549e017dfe46
SHA1dad8ecb763a7a6125734f2a26c6e83efe01d5aa0
SHA256de92f1289746d909aee01d3ea13608ea5aabc7ee818a7cbb136dc4e84142fbba
SHA512cc7f733906029af08d4f5f2c7be4e6b5034f509735a168b91fca557e992ec8c5c707e6019046ae28897af7575d075ce7cdeefac8e40e67ca730cf6509dd948ad
-
Filesize
459B
MD57faaa3b45e9bc3a1b47d5fd6ebbba161
SHA1482cd7d4a9206b1398c90e3eb95d4a8646d73fcc
SHA2566a36e2d030b0bf96351c4d6ec012690d8e01bb4f010f72ab0b400dbcb2534d07
SHA512cadf862d842db38580080a11e44faf6d80e0975438786b786c5f0d7326d1a70b6f93ee12abf9cfe6de52150e9606f31350ac02360a8aaa3432f61963a097c64a
-
Filesize
4KB
MD5bab8a9d1340bdd6b1f49d94343ef882d
SHA14f8c5df5f841e03cf5f9e926e807a60f250d4f17
SHA25609797da299d96861f6172f43f1be5bab72461ba09d3bb0033f3e2438972c08fe
SHA51207b8f3cc662f7231e3923ef411a500c6ba9e1aae04e8b0c938b67e5d77915b43ac0acca86e22f6e9f5ba1bbf2c9031b78c35d9e0530b1406ed3fe65b1af72254
-
Filesize
6KB
MD5f30e5d89c7e38cfce978ea0a921c294f
SHA16312a502c1ede20c63faa0e778f71b041a691172
SHA25624bf6bdd0e22973183c5045a61bd4555a8f1e3785269b45b2c9ec4cf1dc6dbc1
SHA512c409735a79cae245ebf90a75e7508650c7735460a2be56012d7b5e8e3d4df8ad18cdaa79a49b451be1d39933f804e72c1a3f468568c48c48d70a1a56534823da
-
Filesize
24KB
MD5d53ac35ab3976e67caeed75c4d44ffc1
SHA1c139ab66d75dc06f98ada34b5baf4d5693266176
SHA256647867c7236bcb78b7d585b476d82a101a077fac43c78dc59e612253fbf69437
SHA512391355c71734ded913239a6db10a3202087e756bccc8e29411108f21b3f2460d9a9c606619aadd785285be70eddcf61ef9519441cd387cd3823c1399a6967cc2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
9KB
MD56adeeaaaa980645ac37460f552659e53
SHA1d75e7c505ff2cdc15fe2e274a3d22910cf2991b9
SHA25646d94ac35502ed3bd6170e3c8010b03c4cbbe5625c2aeeb342f832a81eb41b14
SHA512737e87d1e6e1e2a73eff402bcb1a5771b3477783aeff430a6fa376f095f882e96fe449e5453d337d505b8f8218b245566e9e2838c36f7cd6f5bb1aeba3166933
-
Filesize
129B
MD5d6c7f9316b8b354ae41d240148df8a50
SHA1e5964023d350b4c361e0e7b79b3e4ca2ec2b243f
SHA2568ac1144f9077bc7c60437a9998ce03fce98b539f08723f33ad89da410c42004f
SHA5123c975797f72754e3d6aa75296dc9710d55be67718ce4e76724bef58e92c7f1ac6645934430574c62538533027003e72f523ec658527452f0e469c12d1336fd76