Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/05/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
merek.py
Resource
win11-20240426-en
6 signatures
150 seconds
General
-
Target
merek.py
-
Size
21KB
-
MD5
5037cac6fb4a4bb0260d61b317611d57
-
SHA1
aba4ebe6397e2576c3ce3569b89e3d81352e996d
-
SHA256
e3798dc43a1b3c5e7d6855a2a467e273ef69ce557f572ab68b1c41a709324165
-
SHA512
3494506f2e49b51b3515306381ef006e9dfdc9910000ff074e361dbf0c5d4e4ea7486a1ff492f35223bb6470ddbfe6c7f311a56da3e140141e9262054042bc8d
-
SSDEEP
384:tFJSQ5xC/MKSkF6gWrx9mrdPjznal0qWMbYuKWvJeh7O5zytvLA7RvjO+K:tWYxC/MK3F67rxgxQlWMbYrr7O5sDA78
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1908 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 1908 OpenWith.exe 2140 AcroRd32.exe 2140 AcroRd32.exe 2140 AcroRd32.exe 2140 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2140 1908 OpenWith.exe 84 PID 1908 wrote to memory of 2140 1908 OpenWith.exe 84 PID 1908 wrote to memory of 2140 1908 OpenWith.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\merek.py1⤵
- Modifies registry class
PID:1548
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\merek.py"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3824