Analysis

  • max time kernel
    109s
  • max time network
    131s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    12/02/2025, 21:08

General

  • Target

    piponis-main/bdorjfusiejf.exe

  • Size

    1.2MB

  • MD5

    827b47b504359721ae370087ce106e48

  • SHA1

    51fe484246dd8e55090e83b050b4590ce32afca1

  • SHA256

    764aeaf8455c2e540f80ff925378f27b29496ef7f6cdcb33601239d860adf07c

  • SHA512

    814f2e40da98b9004e8b0b62928be31f8febe2d58f3144386cee0504ac63602b90a88ab6903d710f48a6c5e42f04fb17d62057424db2f5f2f6e6b6e631164e17

  • SSDEEP

    24576:fBkzrlRdC7MHoy3F1bnirbMIlyhsZC8xXJzd/BWBf4f9GHN:fGz4AHoEvOrbMIPISJzd5AGG

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\piponis-main\bdorjfusiejf.exe
    "C:\Users\Admin\AppData\Local\Temp\piponis-main\bdorjfusiejf.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1204
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgaW5zdGFsbGRhdGV0aW1lPSIxNzM5MjcwMTc2IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzODM3NDE5NzIxMjIwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjE3OTg2MiIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDk5MDE4MzAyNCIvPjwvYXBwPjwvcmVxdWVzdD4
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-0-0x0000000000B70000-0x0000000000F31000-memory.dmp

    Filesize

    3.8MB

  • memory/1204-1-0x0000000000B70000-0x0000000000F31000-memory.dmp

    Filesize

    3.8MB

  • memory/1204-2-0x0000000000B70000-0x0000000000F31000-memory.dmp

    Filesize

    3.8MB

  • memory/1204-4-0x0000000000B70000-0x0000000000F31000-memory.dmp

    Filesize

    3.8MB

  • memory/1204-6-0x0000000000B70000-0x0000000000F31000-memory.dmp

    Filesize

    3.8MB