Analysis
-
max time kernel
15s -
max time network
60s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11/07/2021, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
Mionoho.bin.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Mionoho.bin.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
Mionoho.bin.exe
-
Size
106KB
-
MD5
5d7a2ff61b5e65fe87f499c961330055
-
SHA1
5d637366e15b1e4985dc5de584aa4fb6b2e363c2
-
SHA256
f2f6239736c48ace45e4da7a55be36e7d4c0b4a6b756a2fd35567260f4ac9713
-
SHA512
1d914048023f1817545a1c5f1f9b5ae3dd563eca530a755d352ebb9a25310be7dd6aaa97a54a1dd13b928f4e543270169a3f555ab55e8845f2b6e70b088798d0
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" Mionoho.bin.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "1" Mionoho.bin.exe -
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Sets file execution options in registry 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Mionoho.bin.exe" Mionoho.bin.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mionoho.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Mionoho.bin.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\DestructiveMusic.wav Mionoho.bin.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\Wallpaper Mionoho.bin.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe 1220 Mionoho.bin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 Mionoho.bin.exe Token: SeIncBasePriorityPrivilege 1220 Mionoho.bin.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Mionoho.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mionoho.bin.exe"C:\Users\Admin\AppData\Local\Temp\Mionoho.bin.exe"1⤵
- Modifies WinLogon for persistence
- Modifies security service
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1220