Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    507s
  • max time network
    368s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 14:41

General

  • Target

    MerekV3.08_Lite.rar

  • Size

    6.0MB

  • MD5

    f2bd1f51b61709643431a7b76fe711d3

  • SHA1

    6a2b399f69060f506b57e9086cd885f5a97e53b3

  • SHA256

    98b52813707d4293c6150cd7e602240ad1ca266807c3c7225f2a3dbf6de7a13d

  • SHA512

    473bd23c632b6153e670b0576e56d842eef2fac7efd2622c6205e478c41d34f525dc50b7ad7a7f6c62e131d6d45ece2f982bbb15291b3aff8262a0f95400396c

  • SSDEEP

    98304:/1nBT6FapjeZ+FOT5YFUbnppHpMlr5QwlUPwR6KF8IlSezJZQIDb+3wrahHR/w4a:/1nBXqZ+MlsUbppH21lU4R6KFjxVZHz5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MerekV3.08_Lite.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08_Lite.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2656
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x544
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3044
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\merek.py
    1⤵
    • Modifies registry class
    PID:2908
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\start.bat" "
    1⤵
      PID:1824
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\" -ad -an -ai#7zMap570:130:7zEvent13004
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2924
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\0
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\0"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1984
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\0
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\0"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:748

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best.pt

        Filesize

        6.3MB

        MD5

        af3c08402ed7adce6509a46e14e80404

        SHA1

        3366b883a2867fea070dda6341521b0e47d3e58e

        SHA256

        298525255ca2fc00aebf18d3168bcec0a9ec04430de6ed8253e61c58a3a81870

        SHA512

        94e1d98b84b677ec710f1d753fb89a86dd43a8a9132156cb8032fdeeb62d2a1ccea8e771aa0744e490b13167ff3b27d3dff420f44d5757b46c74ad31b1868218

      • C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\0

        Filesize

        3KB

        MD5

        cc57c80a309157575c6fddfd6aa45271

        SHA1

        0fa18c4baf860c6c317d850e6fcf3254971d0ee7

        SHA256

        7a5a259af2830d09432e6c0143447ba85a20d1019860665dcbdd1d729cf50947

        SHA512

        beb6fc39a7e95c84d7746d68f51af9970ca70216ff4f96801968918b5967c48bb203dd98434f1734f40322e650f3b34ed8ef904bb22b05126ef1a603fc64f929

      • C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\lib\best\best\data\11

        Filesize

        8B

        MD5

        33cdeccccebe80329f1fdbee7f5874cb

        SHA1

        3da89ee273be13437e7ecf760f3fbd4dc0e8d1fe

        SHA256

        7c9fa136d4413fa6173637e883b6998d32e1d675f88cddff9dcbcf331820f4b8

        SHA512

        991294f43425a5b80f8a5907ca7cdbb611401282585a58bb415077005428e3b4c0f661fc07ba5c45f627bd8bdcb172389ce2fda461c029b837abc70f0abbea20

      • C:\Users\Admin\Desktop\MerekV3.08 Lite\Merek Aimbot\start.bat

        Filesize

        22B

        MD5

        37c4f262dabdf01445d615d1354fddd3

        SHA1

        e044e64cee96c0dc2ddadd1c2b9e422869f85498

        SHA256

        165ccde119e16783475aefa4915ac1f7e251fbbd4c37be85cad3fb2fe87cbb73

        SHA512

        bf8bf1826f1ef8f6669d099f0177532fe9128e3b02ed22c338085e6338c3c8b0d87cd7a4dac49e56d43f9a21dcdf0ffc21d408efbe96879387468de05b5a16b5

      • memory/1540-1006-0x000000002F221000-0x000000002F222000-memory.dmp

        Filesize

        4KB

      • memory/1540-1007-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1540-1008-0x0000000070D8D000-0x0000000070D98000-memory.dmp

        Filesize

        44KB

      • memory/1540-1026-0x0000000070D8D000-0x0000000070D98000-memory.dmp

        Filesize

        44KB