Overview
overview
7Static
static
7Email-Worm....a.exe
windows7-x64
7Email-Worm....a.exe
windows10-2004-x64
7Email-Worm...99.exe
windows7-x64
5Email-Worm...99.exe
windows10-2004-x64
5Email-Worm...OU.vbs
windows7-x64
1Email-Worm...OU.vbs
windows10-2004-x64
1Email-Worm/Jer.vbs
windows7-x64
1Email-Worm/Jer.vbs
windows10-2004-x64
1Email-Worm/Kiray.exe
windows7-x64
5Email-Worm/Kiray.exe
windows10-2004-x64
7Email-Worm/Klez.e.exe
windows7-x64
7Email-Worm/Klez.e.exe
windows10-2004-x64
7Email-Worm/Lacon.exe
windows7-x64
7Email-Worm/Lacon.exe
windows10-2004-x64
7Email-Worm....c.exe
windows7-x64
7Email-Worm....c.exe
windows10-2004-x64
7Email-Worm....d.exe
windows7-x64
7Email-Worm....d.exe
windows10-2004-x64
7Email-Worm...tr.exe
windows7-x64
1Email-Worm...tr.exe
windows10-2004-x64
1Email-Worm....a.exe
windows7-x64
5Email-Worm....a.exe
windows10-2004-x64
5Email-Worm/Mari.exe
windows7-x64
1Email-Worm/Mari.exe
windows10-2004-x64
1Email-Worm...en.exe
windows7-x64
1Email-Worm...en.exe
windows10-2004-x64
1Email-Worm/Merkur.exe
windows7-x64
5Email-Worm/Merkur.exe
windows10-2004-x64
5Email-Worm...ld.exe
windows7-x64
5Email-Worm...ld.exe
windows10-2004-x64
1Email-Worm....A.exe
windows7-x64
7Email-Worm....A.exe
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 01:08
Behavioral task
behavioral1
Sample
Email-Worm/Gruel.a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Email-Worm/Gruel.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Email-Worm/Happy99.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Email-Worm/Happy99.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Email-Worm/ILOVEYOU.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Email-Worm/Jer.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Email-Worm/Jer.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Email-Worm/Kiray.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Email-Worm/Kiray.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Email-Worm/Klez.e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Email-Worm/Klez.e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Email-Worm/Lacon.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Email-Worm/Lacon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Email-Worm/Lentin/Lentin.c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
Email-Worm/Lentin/Lentin.d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Email-Worm/Magistr.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Email-Worm/Magistr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Email-Worm/Maldal.a.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Email-Worm/Maldal.a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Email-Worm/Mari.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Email-Worm/Mari.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Email-Worm/MeltingScreen.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Email-Worm/MeltingScreen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Email-Worm/Merkur.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Email-Worm/Merkur.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Email-Worm/MsWorld.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Email-Worm/MsWorld.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Email-Worm/MyDoom.A.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Email-Worm/MyDoom.A.exe
Resource
win10v2004-20240226-en
General
-
Target
Email-Worm/Merkur.exe
-
Size
44KB
-
MD5
e6f8f701d646b193139cf0a92229455f
-
SHA1
b7747d41fcf52c3611af1153e46183dacbb3c709
-
SHA256
7e89fabfdbe214bf6a6f9730f3e451e69f752b62bbd54c0a81d2aae2320abd2c
-
SHA512
135d69ed4b3acdeaf45639090cefd48fa02f9ff1fb168d249717d0e2d3295530b697d8ff3fea84fa20a66aeb99437e5b0f2a2c3936f2a109c1068816263003ae
-
SSDEEP
384:/T16PQm7lU7lnDSLOwglunEuMhlkW3YpCzkVei7kVrcwh8PDM9TkLJI4WvEfbqgJ:/hdmCJq1glWlOEDvEo2k/2w/mo
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
Merkur.exedescription ioc process File created \??\c:\Windows\SysWOW64\regme.reg Merkur.exe -
Drops file in Program Files directory 7 IoCs
Processes:
Merkur.exedescription ioc process File created \??\c:\program files\bearshare\shared\Virtual Sex Simulator.exe Merkur.exe File created \??\c:\program files\eDonkey2000\incoming\Virtual Sex Simulator.exe Merkur.exe File created \??\c:\Program Files\mIRC\script.ini Merkur.exe File created \??\c:\program files\eDonkey2000\incoming\IPspoofer.exe Merkur.exe File created \??\c:\program files\kazaa\my shared folder\IPspoofer.exe Merkur.exe File created \??\c:\program files\bearshare\shared\IPspoofer.exe Merkur.exe File created \??\c:\program files\kazaa\my shared folder\Virtual Sex Simulator.exe Merkur.exe -
Drops file in Windows directory 7 IoCs
Processes:
Merkur.exedescription ioc process File opened for modification \??\c:\windows\screensaver.exe Merkur.exe File created \??\c:\WINDOWS\taskman.exe Merkur.exe File opened for modification \??\c:\WINDOWS\taskman.exe Merkur.exe File created \??\c:\Windows\System\AVupdate.exe Merkur.exe File opened for modification \??\c:\Windows\System\AVupdate.exe Merkur.exe File created \??\c:\Windows\Notepad.exe Merkur.exe File created \??\c:\windows\screensaver.exe Merkur.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 3328 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Merkur.exepid process 2948 Merkur.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Merkur.exedescription pid process target process PID 2948 wrote to memory of 3328 2948 Merkur.exe regedit.exe PID 2948 wrote to memory of 3328 2948 Merkur.exe regedit.exe PID 2948 wrote to memory of 3328 2948 Merkur.exe regedit.exe PID 2948 wrote to memory of 4500 2948 Merkur.exe cmd.exe PID 2948 wrote to memory of 4500 2948 Merkur.exe cmd.exe PID 2948 wrote to memory of 4500 2948 Merkur.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Email-Worm\Merkur.exe"C:\Users\Admin\AppData\Local\Temp\Email-Worm\Merkur.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\regedit.exeregedit /s c:\Windows\system32\regme.reg2⤵
- Runs .reg file with regedit
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\pr0n.bat2⤵PID:4500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e6f8f701d646b193139cf0a92229455f
SHA1b7747d41fcf52c3611af1153e46183dacbb3c709
SHA2567e89fabfdbe214bf6a6f9730f3e451e69f752b62bbd54c0a81d2aae2320abd2c
SHA512135d69ed4b3acdeaf45639090cefd48fa02f9ff1fb168d249717d0e2d3295530b697d8ff3fea84fa20a66aeb99437e5b0f2a2c3936f2a109c1068816263003ae
-
Filesize
126B
MD51065f6f41c70e40297555b6d1878e823
SHA118b6b3b6da306b12c7b1f197d6242d2f66703023
SHA256ab59535ddcea09a82c549ab4f72e0459cc57e41f5b887c42afde0a1dc1ae9947
SHA51225aac67f601ad21878bd0c92bec8e68433dbdb05621f74d5d23c0b0db1960313e695ce6082abaa82e7ab922323e1fbdd0f9a484ae2cf01abecf431cb4bee5ea8