Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
Table of Contents
1.SCOPE.............................................................................................................................5
1.1SYSTEM OVERVIEW AND DESCRIPTION.......................................................................5
1.2ASSUMPTIONS AND CONSTRAINTS..............................................................................5
1.3CONVENTIONS.............................................................................................................5
2.APPLICABLE DOCUMENTS......................................................................................5
3.SYSTEM DESCRIPTION.............................................................................................5
3.1TECHNICAL REFERENCES............................................................................................6
3.2SYSTEM CONCEPTS AND CAPABILITIES.......................................................................6
3.3PREREQUISITES............................................................................................................7
4.OPERATION...................................................................................................................7
4.1QUICK OVERVIEW.......................................................................................................8
4.2CONFIGURING EMOTIONAL SIMIAN.............................................................................8
4.2.1Main Form:.........................................................................................................9
4.2.2Optional Dll Parameters:..................................................................................10
4.2.3Payload Tab:......................................................................................................11
4.2.4Survey Tab:........................................................................................................13
4.2.5File Collection Tab:...........................................................................................14
4.2.6ES Server Configurations Tab:..........................................................................15
4.3DEPLOYMENT TO PRIMARY HOST.............................................................................15
4.4LEFT BEHIND DATA....................................................................................................16
4.4.1Primary Host Data............................................................................................16
4.4.2Secondary Host Data.........................................................................................16
4.5RETRIEVAL OF COLLECTED FILES.............................................................................16
4.5.1If a whitelisted drive returns to the Primary Host.............................................16
4.6POST PROCESS OF COLLECTED FILES........................................................................17
4.7ADDITIONAL SOFTWARE............................................................................................17
4.7.1Keygen.exe:.......................................................................................................17
4.7.2Extract WM Files.exe........................................................................................17
4.7.3Get SN.exe.........................................................................................................17
4.7.4Whack_Thumbdrive.exe.....................................................................................17
3
SECRET//X1
CL BY: 2397517
REASON: 1.4(c)
DECL: 20361019
DRV: COL S-06