Overview
overview
7Static
static
7Email-Worm....a.exe
windows7-x64
7Email-Worm....a.exe
windows10-2004-x64
7Email-Worm...99.exe
windows7-x64
5Email-Worm...99.exe
windows10-2004-x64
5Email-Worm...OU.vbs
windows7-x64
1Email-Worm...OU.vbs
windows10-2004-x64
1Email-Worm/Jer.vbs
windows7-x64
1Email-Worm/Jer.vbs
windows10-2004-x64
1Email-Worm/Kiray.exe
windows7-x64
5Email-Worm/Kiray.exe
windows10-2004-x64
7Email-Worm/Klez.e.exe
windows7-x64
7Email-Worm/Klez.e.exe
windows10-2004-x64
7Email-Worm/Lacon.exe
windows7-x64
7Email-Worm/Lacon.exe
windows10-2004-x64
7Email-Worm....c.exe
windows7-x64
7Email-Worm....c.exe
windows10-2004-x64
7Email-Worm....d.exe
windows7-x64
7Email-Worm....d.exe
windows10-2004-x64
7Email-Worm...tr.exe
windows7-x64
1Email-Worm...tr.exe
windows10-2004-x64
1Email-Worm....a.exe
windows7-x64
5Email-Worm....a.exe
windows10-2004-x64
5Email-Worm/Mari.exe
windows7-x64
1Email-Worm/Mari.exe
windows10-2004-x64
1Email-Worm...en.exe
windows7-x64
1Email-Worm...en.exe
windows10-2004-x64
1Email-Worm/Merkur.exe
windows7-x64
5Email-Worm/Merkur.exe
windows10-2004-x64
5Email-Worm...ld.exe
windows7-x64
5Email-Worm...ld.exe
windows10-2004-x64
1Email-Worm....A.exe
windows7-x64
7Email-Worm....A.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 01:08
Behavioral task
behavioral1
Sample
Email-Worm/Gruel.a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Email-Worm/Gruel.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Email-Worm/Happy99.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Email-Worm/Happy99.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Email-Worm/Jer.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Email-Worm/Jer.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Email-Worm/Kiray.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Email-Worm/Kiray.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Email-Worm/Klez.e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Email-Worm/Klez.e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Email-Worm/Lacon.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Email-Worm/Lacon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Email-Worm/Magistr.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Email-Worm/Magistr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Email-Worm/Maldal.a.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Email-Worm/Maldal.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Email-Worm/Mari.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Email-Worm/Mari.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Email-Worm/MeltingScreen.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Email-Worm/MeltingScreen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Email-Worm/Merkur.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Email-Worm/Merkur.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Email-Worm/MsWorld.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Email-Worm/MsWorld.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Email-Worm/MyDoom.A.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Email-Worm/MyDoom.A.exe
Resource
win10v2004-20240226-en
General
-
Target
Email-Worm/Lentin/Lentin.c.exe
-
Size
1.2MB
-
MD5
04ee0eff07a7e545f7052031ca0d8133
-
SHA1
56676f042cca5170a82f1fdc38648923297e8147
-
SHA256
50d60cd841a18b05e00ab4691fc1e30f6a099a65a58ba51080304205fbb0d666
-
SHA512
f4edcf31e36c94c1c568ec066edb961e7be6bdd25121cc118d5f19379cc57ab1db16ed14487c56d3838543b7668ce2b79f8ff510a646ae1216de811a23330551
-
SSDEEP
24576:yNybvnjuTqLU1P5sRs+89LvlFoizMADpTh+Dj0ZRze:tnqTD1BICiizMIpA3g6
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
Lentin.c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lentin.c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"c:\\recycled\\lcmte\" %1 %*" Lentin.c.exe -
Drops file in Windows directory 3 IoCs
Processes:
Lentin.c.exedescription ioc process File created C:\Windows\.txt Lentin.c.exe File opened for modification C:\Windows\lcmtelcmte.dll Lentin.c.exe File created C:\Windows\lcmte.txt Lentin.c.exe -
Processes:
Lentin.c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main Lentin.c.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
Lentin.c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.sunnt.com/suryatv" Lentin.c.exe -
Modifies registry class 2 IoCs
Processes:
Lentin.c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lentin.c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"c:\\recycled\\lcmte\" %1 %*" Lentin.c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Lentin.c.exedescription pid process Token: SeSystemtimePrivilege 2200 Lentin.c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Email-Worm\Lentin\Lentin.c.exe"C:\Users\Admin\AppData\Local\Temp\Email-Worm\Lentin\Lentin.c.exe"1⤵
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2200