Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 12:15

General

  • Target

    winever_ev700.exe

  • Size

    1.6MB

  • MD5

    dce481dc793735312c681fffc636bfde

  • SHA1

    e4d5d2f32b01ceaea685b7b286e27c75baeafaf9

  • SHA256

    2a37a0585e7f61c3e3a6f49b0db10b6b23bc6fbf7d41b814f292200e6be33019

  • SHA512

    2fd8fbb95b63903ec64bcfc9576e6f9b93b475983985aad8f523ae37355d3156f362c16817231ddc70aefa70fa2adeecd8d55eb1c7619d1547ccc4b7cb92f262

  • SSDEEP

    24576:r+PSzUFt8Vzw8y9/gRxxCuAmI+EQrmVln5sgxUd52WujzNYttloMZiZMfg8+QS3L:qyitJ8LT8QEQrmpGDVujxuEMZiFznL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 19 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winever_ev700.exe
    "C:\Users\Admin\AppData\Local\Temp\winever_ev700.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Program Files (x86)\Windows Everlive\winext.exe
      "C:\Program Files (x86)\Windows Everlive\winext.exe" "-ext"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:396
    • C:\Program Files (x86)\Windows Everlive\winesru.exe
      "C:\Program Files (x86)\Windows Everlive\winesru.exe" "-i=winever_ev700.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3612
  • C:\Program Files (x86)\Windows Everlive\winesrv.exe
    "C:\Program Files (x86)\Windows Everlive\winesrv.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Program Files (x86)\Windows Everlive\winever.exe
      "C:\Program Files (x86)\Windows Everlive\winever.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4076
    • C:\Program Files (x86)\Windows Everlive\winesru.exe
      "C:\Program Files (x86)\Windows Everlive\winesru.exe" -u
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Everlive\winesru.exe

    Filesize

    299KB

    MD5

    36f630e4832633011a332f4b6821333d

    SHA1

    ff31fea68035f66242d65cc8199f5ea30bff6713

    SHA256

    02d6cdb5a94c25e287fa6b4ee695988d440af9875ac4269fa9f4dc0c09252964

    SHA512

    6acbbae3418ba0eaa039a6bd8af8fa2d26723c343c6ce2bdea5d5822ccf7c83bca355176be11452fff51876e1a63b0848ff3f73850163dc823cc4cd4b21c65d6

  • C:\Program Files (x86)\Windows Everlive\winesrv.exe

    Filesize

    86KB

    MD5

    51d540f3169d9dfe53ab17033cb04ca4

    SHA1

    bb8a17ceda1e9ce986b49830e3bb0e2c77ec4cb3

    SHA256

    e1ecd3e5d0c05cafbc61d27b544f519d3c9a43641bfbc797441e45317dce2b31

    SHA512

    65a233c5f8c789f789d964a87fceee7bd7c6b9f55b83d1774604f35051d65d2f1e6d11b6df464a0a2f21f326f2a90ea63d5b8eb446b89e5320a054d0c4337034

  • C:\Program Files (x86)\Windows Everlive\winever.exe

    Filesize

    828KB

    MD5

    8a96dacdca2da31d8bf88947e6cebccf

    SHA1

    0ba771b6a7a7f10b29d63cc2d035bab1c2dca331

    SHA256

    c5710657969271b47039e88a3cf1bb0cf4394c4ff024a909c14b14b6982255b3

    SHA512

    dc8506922ae4d2379ce0c977e2acb06b72f7fad3f5ea789c7f5adfe13a64ee0f6044780685738bde46eea8c96e3162ccd2385bdd55210457820c010d2f4789c9

  • C:\Program Files (x86)\Windows Everlive\winext.exe

    Filesize

    1.4MB

    MD5

    8b3e99a0c6b84dd104eb673923a1d542

    SHA1

    a5b095c0b87bfcc7cbc1e72c43b2b7682f885aaf

    SHA256

    b7870b98eb389e00f7926b2651415bc03d475526a05f117648ec54846b26ebac

    SHA512

    dc44f86844627d993dcf2530294062d50da016fe3e8623b20074d1910acd14a77f2d07cc03b85fc7e46a690583937df1f51d2c0130a395e3d6b4a8d3a56940e7

  • C:\Users\Admin\AppData\Local\Temp\nsrD65C.tmp\Processes.dll

    Filesize

    140KB

    MD5

    3c3cda1dabf094f7be067e1d69342d57

    SHA1

    95bc35eaefd13a3f19783df87111a545395c3e27

    SHA256

    bb65cb9dba34680beaacf9c644cd3eff3ea79b674d00ed215835d4c3e0ae621c

    SHA512

    b35b8be0a190f88193818e16ea1354ec792047d38d93d16753d639353e3cb2edecacb41eb10418e55c26479f9a6e2145ed9055429ebccaf43e91e3f9f85bb82f

  • C:\Users\Admin\AppData\Local\Temp\nsrD65C.tmp\SimpleSC.dll

    Filesize

    61KB

    MD5

    859a019ff8cd23433bb0f6147773680c

    SHA1

    81cf2c41259ff5abc898ee31c3d67d6c0d26d506

    SHA256

    eab581d0ba757ff654dacd3349593ebd5aab632f46167ede10111c4ad50156e8

    SHA512

    50aa51d6f9827575cfd004e33ba4f4d17f2b24956bbdb861948419e80be4db20cda6beb6f43d3921cf9e512a61662290e037ebcdc275da7319fbc53907007ff1

  • C:\Users\Admin\AppData\Local\Temp\nsrD65C.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsrD65C.tmp\WinOS.dll

    Filesize

    44KB

    MD5

    d1590cb1b028642d102e1d83a2416c6d

    SHA1

    1019074325a97d3e441b42c88cbfbff117c91b07

    SHA256

    6f172dcd874d8aacad8d111d6b5296273fe9b568df472f429c046148303b164d

    SHA512

    1280e38d48132cae8614e1327ae285b40dd4bbc37c0c5bb4425af1794fbc3f690b8dd09221e16729795fa39b6d4e7f199a15b63a068e600ebbb0ec7952db9aea

  • memory/4076-94-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4076-92-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4176-18-0x0000000002C10000-0x0000000002C23000-memory.dmp

    Filesize

    76KB

  • memory/4176-33-0x0000000002C10000-0x0000000002C35000-memory.dmp

    Filesize

    148KB

  • memory/4176-10-0x0000000002C10000-0x0000000002C1C000-memory.dmp

    Filesize

    48KB