Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MerekV3.08_Lite.rar
windows7-x64
4MerekV3.08_Lite.rar
windows10-2004-x64
7MerekV3.08...DME.md
windows7-x64
3MerekV3.08...DME.md
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...st.zip
windows7-x64
1MerekV3.08...st.zip
windows10-2004-x64
1best/.data...ion_id
windows7-x64
1best/.data...ion_id
windows10-2004-x64
1best/byteorder
windows7-x64
1best/byteorder
windows10-2004-x64
1best/data.pkl
windows7-x64
3best/data.pkl
windows10-2004-x64
3best/data/0
windows7-x64
1best/data/0
windows10-2004-x64
1best/data/1
windows7-x64
1best/data/1
windows10-2004-x64
1best/data/10
windows7-x64
1best/data/10
windows10-2004-x64
1best/data/100
windows7-x64
1best/data/100
windows10-2004-x64
1best/data/101
windows7-x64
1best/data/101
windows10-2004-x64
1best/data/102
windows7-x64
1best/data/102
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 14:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08_Lite.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08_Lite.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
best/.data/serialization_id
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
best/.data/serialization_id
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
best/byteorder
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
best/byteorder
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
best/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
best/data.pkl
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
best/data/0
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
best/data/0
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
best/data/1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
best/data/1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
best/data/10
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
best/data/10
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
best/data/100
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
best/data/100
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
best/data/101
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
best/data/101
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
best/data/102
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
best/data/102
Resource
win10v2004-20240226-en
General
-
Target
MerekV3.08 Lite/Merek Aimbot/README.md
-
Size
752B
-
MD5
f8238688955ceec65b8a30c8c803d942
-
SHA1
e03ecc55bcf254bae6801cdb0d351854b21a7739
-
SHA256
38c0d0c16fb615672b9c5635bfcdc569670deb4194d16fdb87585a7a813aac21
-
SHA512
d55794aee2beae7e892b03843b3837ffd4de91f72b33054c9516e8c5434f106e732800a1ded9f40d3445f469fad808815695956fe374a6a0da927dda1175b740
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 AcroRd32.exe 2596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2868 wrote to memory of 2568 2868 cmd.exe 29 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30 PID 2568 wrote to memory of 2596 2568 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\README.md"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a8dbaa91fbba92b1cbd8e01c761d4360
SHA1ec212c930466061f3ecc00d36334994191c75019
SHA25679a19189f45312fc6e4e49d536eb73f77c9350eaa243789befed2cadac0621de
SHA5121bb09c39dd9958f1aa86eae510436a24866e9e1a0bf2975f3e249489843ec34e2f29230fdceea2e34e0a439eaa804f914b5b018c739b9ff7d40bac99f3a9217e