Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MerekV3.08_Lite.rar
windows7-x64
4MerekV3.08_Lite.rar
windows10-2004-x64
7MerekV3.08...DME.md
windows7-x64
3MerekV3.08...DME.md
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...st.zip
windows7-x64
1MerekV3.08...st.zip
windows10-2004-x64
1best/.data...ion_id
windows7-x64
1best/.data...ion_id
windows10-2004-x64
1best/byteorder
windows7-x64
1best/byteorder
windows10-2004-x64
1best/data.pkl
windows7-x64
3best/data.pkl
windows10-2004-x64
3best/data/0
windows7-x64
1best/data/0
windows10-2004-x64
1best/data/1
windows7-x64
1best/data/1
windows10-2004-x64
1best/data/10
windows7-x64
1best/data/10
windows10-2004-x64
1best/data/100
windows7-x64
1best/data/100
windows10-2004-x64
1best/data/101
windows7-x64
1best/data/101
windows10-2004-x64
1best/data/102
windows7-x64
1best/data/102
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08_Lite.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08_Lite.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
best/.data/serialization_id
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
best/.data/serialization_id
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
best/byteorder
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
best/byteorder
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
best/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
best/data.pkl
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
best/data/0
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
best/data/0
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
best/data/1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
best/data/1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
best/data/10
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
best/data/10
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
best/data/100
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
best/data/100
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
best/data/101
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
best/data/101
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
best/data/102
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
best/data/102
Resource
win10v2004-20240226-en
General
-
Target
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
-
Size
34KB
-
MD5
04e7fdcd4824b4926faf0672c6184669
-
SHA1
32dfc09985a2a08e0902fa32167a3792ea5a84a5
-
SHA256
eee9a338a1c8abdb35f2bc3dec224e803f7392625590369c361a177206a9dd1f
-
SHA512
bdff9f007288bb62a6ba8b8c4ad4ad5abd81be1e5258466a9e762591dd679280b29d11c0c79912721d4de5473f72cc4e53467ed0fa774bd3148a06b8152e16a9
-
SSDEEP
768:RS7dB1VkMpBJhcY3ZNBIHNNgmTns+2YxxM5L0s2YfuIb2eQETf4swoK27:RyvVkM42u7guxM5I7aSeQEfGoD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2568 AcroRd32.exe 2568 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2840 2804 cmd.exe 29 PID 2804 wrote to memory of 2840 2804 cmd.exe 29 PID 2804 wrote to memory of 2840 2804 cmd.exe 29 PID 2840 wrote to memory of 2568 2840 rundll32.exe 30 PID 2840 wrote to memory of 2568 2840 rundll32.exe 30 PID 2840 wrote to memory of 2568 2840 rundll32.exe 30 PID 2840 wrote to memory of 2568 2840 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\aimbot.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\aimbot.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\aimbot.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58cbe054a0e7345537fdc14d074b9e4fe
SHA1aae36628357b70ad7d890cae8f33c99489e6698e
SHA256ef9480c4ba919636a7961960f90feef9b7fa1d8c26911beec732abe4860ab881
SHA5127e0d09f3af0e0437d97b5c2dee6a4c4e6f573e53d5407e1b5c3abd95d54a4bac5f1cd5ab71cd7eef145780219222d3fe3c4e8ba9b9197d0cff89eb3668b3c1b1