Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MerekV3.08_Lite.rar
windows7-x64
4MerekV3.08_Lite.rar
windows10-2004-x64
7MerekV3.08...DME.md
windows7-x64
3MerekV3.08...DME.md
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...st.zip
windows7-x64
1MerekV3.08...st.zip
windows10-2004-x64
1best/.data...ion_id
windows7-x64
1best/.data...ion_id
windows10-2004-x64
1best/byteorder
windows7-x64
1best/byteorder
windows10-2004-x64
1best/data.pkl
windows7-x64
3best/data.pkl
windows10-2004-x64
3best/data/0
windows7-x64
1best/data/0
windows10-2004-x64
1best/data/1
windows7-x64
1best/data/1
windows10-2004-x64
1best/data/10
windows7-x64
1best/data/10
windows10-2004-x64
1best/data/100
windows7-x64
1best/data/100
windows10-2004-x64
1best/data/101
windows7-x64
1best/data/101
windows10-2004-x64
1best/data/102
windows7-x64
1best/data/102
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08_Lite.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08_Lite.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
best/.data/serialization_id
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
best/.data/serialization_id
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
best/byteorder
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
best/byteorder
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
best/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
best/data.pkl
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
best/data/0
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
best/data/0
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
best/data/1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
best/data/1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
best/data/10
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
best/data/10
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
best/data/100
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
best/data/100
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
best/data/101
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
best/data/101
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
best/data/102
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
best/data/102
Resource
win10v2004-20240226-en
General
-
Target
best/data.pkl
-
Size
114KB
-
MD5
3a9f943d6da55be64c0692ba897c7bac
-
SHA1
6257ec35f5e8bdc29655704c26a2c8ec3c1e4999
-
SHA256
9666a679353968e69c27f3a8cb21003311fec7b217ef0f95e6e7d659aaf17530
-
SHA512
aba7f27dcfe5e44aff819e39ced6690482e4e09f07c3c789a46a4380718e97be872be1b62df8fa52c989f23213fc0f2838afb17604f4e719924675b070488a16
-
SSDEEP
1536:2lBrbLLAm5kG5BFgBCaEbehLr8z2ildu9Jr7y+aZ/7NjaR/97o9JcCZee4zr3ZFa:2rvL5HbehLr8z2iWc0beuJ7sjBz3j
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pkl rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pkl_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pkl\ = "pkl_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2612 AcroRd32.exe 2612 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2196 2320 cmd.exe 29 PID 2320 wrote to memory of 2196 2320 cmd.exe 29 PID 2320 wrote to memory of 2196 2320 cmd.exe 29 PID 2196 wrote to memory of 2612 2196 rundll32.exe 30 PID 2196 wrote to memory of 2612 2196 rundll32.exe 30 PID 2196 wrote to memory of 2612 2196 rundll32.exe 30 PID 2196 wrote to memory of 2612 2196 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\best\data.pkl1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\best\data.pkl2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\best\data.pkl"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD502b958fa24f1a9428da304a7cb1da32f
SHA1beb17c9e9aae2e5d520e0ea480bd2b3e68013833
SHA2561b1cb54053afc90c48a17a95d42ef1a2ab9a7341d84524d9a7924b367d02871b
SHA5127aec4798260b3c06ba786c914c0366670d068692a78895f619008eed7553b7c547b2114b3eb1c59807f679852e8d370229b2643144226a6d1c7ade1e34fc0014