Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MerekV3.08_Lite.rar
windows7-x64
4MerekV3.08_Lite.rar
windows10-2004-x64
7MerekV3.08...DME.md
windows7-x64
3MerekV3.08...DME.md
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...st.zip
windows7-x64
1MerekV3.08...st.zip
windows10-2004-x64
1best/.data...ion_id
windows7-x64
1best/.data...ion_id
windows10-2004-x64
1best/byteorder
windows7-x64
1best/byteorder
windows10-2004-x64
1best/data.pkl
windows7-x64
3best/data.pkl
windows10-2004-x64
3best/data/0
windows7-x64
1best/data/0
windows10-2004-x64
1best/data/1
windows7-x64
1best/data/1
windows10-2004-x64
1best/data/10
windows7-x64
1best/data/10
windows10-2004-x64
1best/data/100
windows7-x64
1best/data/100
windows10-2004-x64
1best/data/101
windows7-x64
1best/data/101
windows10-2004-x64
1best/data/102
windows7-x64
1best/data/102
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08_Lite.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08_Lite.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/best.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
best/.data/serialization_id
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
best/.data/serialization_id
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
best/byteorder
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
best/byteorder
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
best/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
best/data.pkl
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
best/data/0
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
best/data/0
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
best/data/1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
best/data/1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
best/data/10
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
best/data/10
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
best/data/100
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
best/data/100
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
best/data/101
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
best/data/101
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
best/data/102
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
best/data/102
Resource
win10v2004-20240226-en
General
-
Target
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
-
Size
19KB
-
MD5
03913d5dcd09637c06deba35d3cf8ab6
-
SHA1
3c49ea419bcd02e50a5102e60387d09a079b7d57
-
SHA256
f97e0981bbfec62065e9101300ab345f2389c6b94606a2ea655b8c38e11aa575
-
SHA512
8be7da1ba56dd7b2e62e7f4db6d96fa0ac04bcddb231c36a79d3cdf55a5af5f5808b1604ee5552943665cb39298fc1f9c163f796284c8268606a8782f688a8ba
-
SSDEEP
384:8PZGJybYD3edL4xzhmp2Ugcem86Rv+dxbpqYSLDYmG0iLnOVy:qjNk7mp2GeX6RvKbpqYSAmH0nCy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3060 2184 cmd.exe 29 PID 2184 wrote to memory of 3060 2184 cmd.exe 29 PID 2184 wrote to memory of 3060 2184 cmd.exe 29 PID 3060 wrote to memory of 2584 3060 rundll32.exe 30 PID 3060 wrote to memory of 2584 3060 rundll32.exe 30 PID 3060 wrote to memory of 2584 3060 rundll32.exe 30 PID 3060 wrote to memory of 2584 3060 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\__pycache__\keyauth.cpython-310.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\__pycache__\keyauth.cpython-310.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\__pycache__\keyauth.cpython-310.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c1e54a2da6dd14920dd5a14402ed995f
SHA1366bb363b9f7c668bfe060c97f4f8440ad01c3fb
SHA256c25f32ce28d1888058ea66bceb0be9d44ca3ca7f24324e1e6f677e5e5fdce014
SHA512fa035bc0c8a32785f3ca27390d8c9698a56500b9a6d7d8a85375522bfd7c0a7bdd071d3deeb47436f68b92b120e572a1981b7f927e456c86f0762051f22f5715