Overview
overview
7Static
static
7Email-Worm....a.exe
windows7-x64
7Email-Worm....a.exe
windows10-2004-x64
7Email-Worm...99.exe
windows7-x64
5Email-Worm...99.exe
windows10-2004-x64
5Email-Worm...OU.vbs
windows7-x64
1Email-Worm...OU.vbs
windows10-2004-x64
1Email-Worm/Jer.vbs
windows7-x64
1Email-Worm/Jer.vbs
windows10-2004-x64
1Email-Worm/Kiray.exe
windows7-x64
5Email-Worm/Kiray.exe
windows10-2004-x64
7Email-Worm/Klez.e.exe
windows7-x64
7Email-Worm/Klez.e.exe
windows10-2004-x64
7Email-Worm/Lacon.exe
windows7-x64
7Email-Worm/Lacon.exe
windows10-2004-x64
7Email-Worm....c.exe
windows7-x64
7Email-Worm....c.exe
windows10-2004-x64
7Email-Worm....d.exe
windows7-x64
7Email-Worm....d.exe
windows10-2004-x64
7Email-Worm...tr.exe
windows7-x64
1Email-Worm...tr.exe
windows10-2004-x64
1Email-Worm....a.exe
windows7-x64
5Email-Worm....a.exe
windows10-2004-x64
5Email-Worm/Mari.exe
windows7-x64
1Email-Worm/Mari.exe
windows10-2004-x64
1Email-Worm...en.exe
windows7-x64
1Email-Worm...en.exe
windows10-2004-x64
1Email-Worm/Merkur.exe
windows7-x64
5Email-Worm/Merkur.exe
windows10-2004-x64
5Email-Worm...ld.exe
windows7-x64
5Email-Worm...ld.exe
windows10-2004-x64
1Email-Worm....A.exe
windows7-x64
7Email-Worm....A.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 01:08
Behavioral task
behavioral1
Sample
Email-Worm/Gruel.a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Email-Worm/Gruel.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Email-Worm/Happy99.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Email-Worm/Happy99.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Email-Worm/Jer.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Email-Worm/Jer.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Email-Worm/Kiray.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Email-Worm/Kiray.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Email-Worm/Klez.e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Email-Worm/Klez.e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Email-Worm/Lacon.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Email-Worm/Lacon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Email-Worm/Magistr.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Email-Worm/Magistr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Email-Worm/Maldal.a.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Email-Worm/Maldal.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Email-Worm/Mari.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Email-Worm/Mari.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Email-Worm/MeltingScreen.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Email-Worm/MeltingScreen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Email-Worm/Merkur.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Email-Worm/Merkur.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Email-Worm/MsWorld.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Email-Worm/MsWorld.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Email-Worm/MyDoom.A.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Email-Worm/MyDoom.A.exe
Resource
win10v2004-20240226-en
General
-
Target
Email-Worm/Lacon.exe
-
Size
12KB
-
MD5
cb0f7b3fd927cf0d0ba36302e6f9af86
-
SHA1
32bdc349a35916e8991e69e9be1bd2596b6321cc
-
SHA256
9b3f73a12a793d1648f3209e1e3f10bbb548b1ec21d53b8ac060b7b95ae4ef1f
-
SHA512
e6152f3645d73c63f3f3aa9881fe8b404f9794b14a8ecaea659621828462baf042c13c88bb7f2c32277fa854ceda3056d09aa5603e92b107c6c8194464154252
-
SSDEEP
192:W+4C8fFkIp+ShIKIw4MUbLblp1E7qBalMyIl3PAHN0PhNx:W5kIp1IM4MUbPn1afIK4x
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
Lacon.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Configuration Utility.exe Lacon.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Configuration Utility.exe Lacon.exe -
Processes:
resource yara_rule behavioral14/memory/2352-0-0x0000000000400000-0x000000000040E000-memory.dmp upx C:\Windows\SysWOW64\No Call List.exe upx behavioral14/memory/2352-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Lacon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bndt32 = "C:\\Windows\\System32\\Bndt32.exe" Lacon.exe -
Drops file in System32 directory 5 IoCs
Processes:
Lacon.exedescription ioc process File created C:\Windows\SysWOW64\Bndt32.exe Lacon.exe File opened for modification C:\Windows\SysWOW64\Bndt32.exe Lacon.exe File created C:\Windows\SysWOW64\No Call List.exe Lacon.exe File opened for modification C:\Windows\SysWOW64\No Call List.exe Lacon.exe File created C:\Windows\SysWOW64\Bndt32.txt Lacon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Lacon.exepid process 2352 Lacon.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\No Call List.exeFilesize
12KB
MD5cb0f7b3fd927cf0d0ba36302e6f9af86
SHA132bdc349a35916e8991e69e9be1bd2596b6321cc
SHA2569b3f73a12a793d1648f3209e1e3f10bbb548b1ec21d53b8ac060b7b95ae4ef1f
SHA512e6152f3645d73c63f3f3aa9881fe8b404f9794b14a8ecaea659621828462baf042c13c88bb7f2c32277fa854ceda3056d09aa5603e92b107c6c8194464154252
-
memory/2352-0-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2352-10-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB