Analysis

  • max time kernel
    108s
  • max time network
    134s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    12/02/2025, 21:08

General

  • Target

    piponis-main/mkthooesfja.exe

  • Size

    1.2MB

  • MD5

    d934e572b7078873439fc889dc55fd27

  • SHA1

    5ea76ae117452a0bb48e6f186ecd2f5b0f7ec813

  • SHA256

    a4ef2b2fb82a9cd793ad679208b1d5c3f174ec798674972372ee894c3f403259

  • SHA512

    2f64414a8c700acdf260a3a980cf134d38fce1681ff59b240a04a25901676a2e19ed1ce14d50c45d05875327f46abfc977dfeff98b215e73c1a2a7f04828a7ef

  • SSDEEP

    24576:gvSzZ3KleKNsbw0ScNZLHEb4eCk2pGZuNHgR8eZkds/h16WVJW:gvIZKlT0SKkb4eC/kZAeBZXH

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\piponis-main\mkthooesfja.exe
    "C:\Users\Admin\AppData\Local\Temp\piponis-main\mkthooesfja.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:848
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDA5ODM5QzQtQkU0Qi00NTM4LUEwMkMtODlFMUI1Q0UwMzM1fSIgdXNlcmlkPSJ7MTg1QUM5QzItRjc0Ri00MzNELTk0OEUtNzIxRDJCNEFBRjkzfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RDczRTcyNjAtQzI3Qi00RkQ0LUJCRUItQkYxNjNGRjZGQUZBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0NC40NTI5IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iMTI1IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-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
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/848-0-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-1-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-2-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-3-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-5-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-6-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-7-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-8-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-9-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-10-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-11-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-12-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB

  • memory/848-13-0x0000000000D30000-0x00000000010F1000-memory.dmp

    Filesize

    3.8MB