Analysis

  • max time kernel
    106s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    12/02/2025, 21:08

General

  • Target

    piponis-main/ltohjksef.exe

  • Size

    1.2MB

  • MD5

    d52a100e13740fcba59d39de72dc87b4

  • SHA1

    9b28120634fe64cc1eaa7e35ace400bf31c8a0cc

  • SHA256

    e42e988a47f4f684249bc8e1e370a32fc53831929adc86b7b1d45fbd3de7fb9a

  • SHA512

    b687ef3164366fff6227170ee2a021acc47532dbb7c072000dca579b724dbe34cb6e22cd8d6d7092faf439f4f8b810b306f6710e50f057367b3ae8d88576cdd0

  • SSDEEP

    24576:+W4KagHjk0jB4GrZ1CcjiFM2m/BBvKBvOrRe3zFuFozqd:+W4KjZjrZgAien/BBvKBvO9kQFo+d

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\piponis-main\ltohjksef.exe
    "C:\Users\Admin\AppData\Local\Temp\piponis-main\ltohjksef.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4320
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjU2RkJGNTMtQjdBNy00NUVELUE4RDYtNkQ0MjU1RDU1QUFDfSIgdXNlcmlkPSJ7NjFBRjIzMDItQjI2My00NTczLTkwMTgtQkRBMzg2OEFGNzQ0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7OUUwQ0YwNzItNjVFNy00QjRCLTlDNTQtN0JGRUFFNzc5M0JBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0NC40NTI5IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iMTI1IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-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
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:4800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4320-0-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-1-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-2-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-3-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-4-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-5-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-6-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB

  • memory/4320-8-0x00000000002C0000-0x0000000000681000-memory.dmp

    Filesize

    3.8MB