Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
35205816a75...18.exe
windows7-x64
75205816a75...18.exe
windows10-2004-x64
7$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...eb.dll
windows7-x64
3$PLUGINSDI...eb.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...K2.dll
windows7-x64
3$PLUGINSDI...K2.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3winever_ev700.exe
windows7-x64
7winever_ev700.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...SC.dll
windows7-x64
3$PLUGINSDI...SC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/WinOS.dll
windows7-x64
3$PLUGINSDIR/WinOS.dll
windows10-2004-x64
3winext.exe
windows7-x64
1winext.exe
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
5205816a750cb86b88614ea22faa75b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5205816a750cb86b88614ea22faa75b3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWeb.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWeb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ISCHECK2.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ISCHECK2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/processes_second.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/processes_second.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
winever_ev700.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
winever_ev700.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/WinOS.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/WinOS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
winext.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
winext.exe
Resource
win10v2004-20241007-en
General
-
Target
winever_ev700.exe
-
Size
1.6MB
-
MD5
dce481dc793735312c681fffc636bfde
-
SHA1
e4d5d2f32b01ceaea685b7b286e27c75baeafaf9
-
SHA256
2a37a0585e7f61c3e3a6f49b0db10b6b23bc6fbf7d41b814f292200e6be33019
-
SHA512
2fd8fbb95b63903ec64bcfc9576e6f9b93b475983985aad8f523ae37355d3156f362c16817231ddc70aefa70fa2adeecd8d55eb1c7619d1547ccc4b7cb92f262
-
SSDEEP
24576:r+PSzUFt8Vzw8y9/gRxxCuAmI+EQrmVln5sgxUd52WujzNYttloMZiZMfg8+QS3L:qyitJ8LT8QEQrmpGDVujxuEMZiFznL
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3056 winext.exe 3036 winesru.exe 2760 winesrv.exe 2828 winever.exe 2632 winesru.exe -
Loads dropped DLL 18 IoCs
pid Process 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 3056 winext.exe 3056 winext.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe 3036 winesru.exe 3036 winesru.exe 2244 winever_ev700.exe 2760 winesrv.exe 2760 winesrv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Everlive\winever.exe winext.exe File opened for modification C:\Program Files (x86)\Windows Everlive\winesrp.exe winext.exe File opened for modification C:\Program Files (x86)\Windows Everlive\winesru.exe winext.exe File opened for modification C:\Program Files (x86)\Windows Everlive\winesrv.exe winext.exe File opened for modification C:\Program Files (x86)\Windows Everlive\winext.exe winever_ev700.exe File created C:\Program Files (x86)\Windows Everlive\uninstall.exe winever_ev700.exe File created C:\Program Files (x86)\Windows Everlive\winext.exe winever_ev700.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winesru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winesrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winever.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winesru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winever_ev700.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2244 winever_ev700.exe 2244 winever_ev700.exe 2244 winever_ev700.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2828 winever.exe 2244 winever_ev700.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3036 winesru.exe 2632 winesru.exe 2828 winever.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3056 2244 winever_ev700.exe 28 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2244 wrote to memory of 3036 2244 winever_ev700.exe 29 PID 2760 wrote to memory of 2828 2760 winesrv.exe 32 PID 2760 wrote to memory of 2828 2760 winesrv.exe 32 PID 2760 wrote to memory of 2828 2760 winesrv.exe 32 PID 2760 wrote to memory of 2828 2760 winesrv.exe 32 PID 2760 wrote to memory of 2632 2760 winesrv.exe 33 PID 2760 wrote to memory of 2632 2760 winesrv.exe 33 PID 2760 wrote to memory of 2632 2760 winesrv.exe 33 PID 2760 wrote to memory of 2632 2760 winesrv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\winever_ev700.exe"C:\Users\Admin\AppData\Local\Temp\winever_ev700.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Windows Everlive\winext.exe"C:\Program Files (x86)\Windows Everlive\winext.exe" "-ext"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Program Files (x86)\Windows Everlive\winesru.exe"C:\Program Files (x86)\Windows Everlive\winesru.exe" "-i=winever_ev700.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Program Files (x86)\Windows Everlive\winesrv.exe"C:\Program Files (x86)\Windows Everlive\winesrv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Windows Everlive\winever.exe"C:\Program Files (x86)\Windows Everlive\winever.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Program Files (x86)\Windows Everlive\winesru.exe"C:\Program Files (x86)\Windows Everlive\winesru.exe" -u2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD551d540f3169d9dfe53ab17033cb04ca4
SHA1bb8a17ceda1e9ce986b49830e3bb0e2c77ec4cb3
SHA256e1ecd3e5d0c05cafbc61d27b544f519d3c9a43641bfbc797441e45317dce2b31
SHA51265a233c5f8c789f789d964a87fceee7bd7c6b9f55b83d1774604f35051d65d2f1e6d11b6df464a0a2f21f326f2a90ea63d5b8eb446b89e5320a054d0c4337034
-
Filesize
828KB
MD58a96dacdca2da31d8bf88947e6cebccf
SHA10ba771b6a7a7f10b29d63cc2d035bab1c2dca331
SHA256c5710657969271b47039e88a3cf1bb0cf4394c4ff024a909c14b14b6982255b3
SHA512dc8506922ae4d2379ce0c977e2acb06b72f7fad3f5ea789c7f5adfe13a64ee0f6044780685738bde46eea8c96e3162ccd2385bdd55210457820c010d2f4789c9
-
Filesize
299KB
MD536f630e4832633011a332f4b6821333d
SHA1ff31fea68035f66242d65cc8199f5ea30bff6713
SHA25602d6cdb5a94c25e287fa6b4ee695988d440af9875ac4269fa9f4dc0c09252964
SHA5126acbbae3418ba0eaa039a6bd8af8fa2d26723c343c6ce2bdea5d5822ccf7c83bca355176be11452fff51876e1a63b0848ff3f73850163dc823cc4cd4b21c65d6
-
Filesize
1.4MB
MD58b3e99a0c6b84dd104eb673923a1d542
SHA1a5b095c0b87bfcc7cbc1e72c43b2b7682f885aaf
SHA256b7870b98eb389e00f7926b2651415bc03d475526a05f117648ec54846b26ebac
SHA512dc44f86844627d993dcf2530294062d50da016fe3e8623b20074d1910acd14a77f2d07cc03b85fc7e46a690583937df1f51d2c0130a395e3d6b4a8d3a56940e7
-
Filesize
140KB
MD53c3cda1dabf094f7be067e1d69342d57
SHA195bc35eaefd13a3f19783df87111a545395c3e27
SHA256bb65cb9dba34680beaacf9c644cd3eff3ea79b674d00ed215835d4c3e0ae621c
SHA512b35b8be0a190f88193818e16ea1354ec792047d38d93d16753d639353e3cb2edecacb41eb10418e55c26479f9a6e2145ed9055429ebccaf43e91e3f9f85bb82f
-
Filesize
61KB
MD5859a019ff8cd23433bb0f6147773680c
SHA181cf2c41259ff5abc898ee31c3d67d6c0d26d506
SHA256eab581d0ba757ff654dacd3349593ebd5aab632f46167ede10111c4ad50156e8
SHA51250aa51d6f9827575cfd004e33ba4f4d17f2b24956bbdb861948419e80be4db20cda6beb6f43d3921cf9e512a61662290e037ebcdc275da7319fbc53907007ff1
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
44KB
MD5d1590cb1b028642d102e1d83a2416c6d
SHA11019074325a97d3e441b42c88cbfbff117c91b07
SHA2566f172dcd874d8aacad8d111d6b5296273fe9b568df472f429c046148303b164d
SHA5121280e38d48132cae8614e1327ae285b40dd4bbc37c0c5bb4425af1794fbc3f690b8dd09221e16729795fa39b6d4e7f199a15b63a068e600ebbb0ec7952db9aea