Overview
overview
10Static
static
10piponis-ma...jf.exe
windows10-ltsc 2021-x64
8piponis-ma...fr.exe
windows10-ltsc 2021-x64
8piponis-ma...we.exe
windows10-ltsc 2021-x64
8piponis-ma...ti.exe
windows10-ltsc 2021-x64
8piponis-ma...id.exe
windows10-ltsc 2021-x64
10piponis-ma...ke.exe
windows10-ltsc 2021-x64
10piponis-ma...js.exe
windows10-ltsc 2021-x64
10piponis-ma...rs.exe
windows10-ltsc 2021-x64
10piponis-ma...ub.exe
windows10-ltsc 2021-x64
10piponis-ma...id.exe
windows10-ltsc 2021-x64
10piponis-ma...rr.exe
windows10-ltsc 2021-x64
piponis-ma...ef.exe
windows10-ltsc 2021-x64
7piponis-ma...ja.exe
windows10-ltsc 2021-x64
8piponis-ma...gl.exe
windows10-ltsc 2021-x64
10piponis-ma...sa.exe
windows10-ltsc 2021-x64
8piponis-ma...th.exe
windows10-ltsc 2021-x64
8piponis-ma...as.exe
windows10-ltsc 2021-x64
8piponis-ma...uw.exe
windows10-ltsc 2021-x64
10piponis-ma...jg.exe
windows10-ltsc 2021-x64
1piponis-ma...jk.exe
windows10-ltsc 2021-x64
10piponis-ma...id.exe
windows10-ltsc 2021-x64
8piponis-ma...wf.exe
windows10-ltsc 2021-x64
8piponis-ma...nd.exe
windows10-ltsc 2021-x64
8Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/02/2025, 21:08
Behavioral task
behavioral1
Sample
piponis-main/bdorjfusiejf.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral2
Sample
piponis-main/bffgjingfr.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral3
Sample
piponis-main/bioldgefsawe.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
piponis-main/cjitigjfktti.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral5
Sample
piponis-main/cjrimgid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral6
Sample
piponis-main/dirificoskejcivke.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral7
Sample
piponis-main/girpwkfuejs.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral8
Sample
piponis-main/heifjejrs.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral9
Sample
piponis-main/horrxjddub.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral10
Sample
piponis-main/jrirkfiweid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral11
Sample
piponis-main/jtunuhhrr.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral12
Sample
piponis-main/ltohjksef.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral13
Sample
piponis-main/mkthooesfja.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral14
Sample
piponis-main/mmytljldrgl.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral15
Sample
piponis-main/mnyksdrfkesa.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral16
Sample
piponis-main/niyjkdrfseth.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral17
Sample
piponis-main/nohtysefhas.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral18
Sample
piponis-main/ogprjsirbfuw.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral19
Sample
piponis-main/oiuyjikdkjg.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral20
Sample
piponis-main/opyjjsefjk.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral21
Sample
piponis-main/plrifjidicfid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral22
Sample
piponis-main/pyjhiksfasewf.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral23
Sample
piponis-main/riroiciend.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
piponis-main/riroiciend.exe
-
Size
28KB
-
MD5
753175a2a378c1448b5e6946d2421599
-
SHA1
1a856255b7868a050cebc02845e4af6acb3912ef
-
SHA256
2a216550fb6ef956beb4029c2c18049a1c66cc271470a09c3b0b6103440e7280
-
SHA512
07e2c0c976c288d3ed0ffe370f6b5538df2c89edc52a21f6025996135d8e4143341e8a0322f7acbb83b9a6c7bae7c88a492aa39c73c88b21bcce19404f133fb3
-
SSDEEP
384:5R6ZTtyvqNUfWhppEvKevF8j0I4GSFdjUNAb2xaSEdKIT4Iqel7xI:5gxyvqNUufpEvLCshK4WID7
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 32 3836 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1779232530-3850357754-1808830527-1000\Control Panel\International\Geo\Nation riroiciend.exe Key value queried \REGISTRY\USER\S-1-5-21-1779232530-3850357754-1808830527-1000\Control Panel\International\Geo\Nation service.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language riroiciend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1424 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 556 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2528 1476 riroiciend.exe 87 PID 1476 wrote to memory of 2528 1476 riroiciend.exe 87 PID 1476 wrote to memory of 2528 1476 riroiciend.exe 87 PID 2528 wrote to memory of 556 2528 cmd.exe 89 PID 2528 wrote to memory of 556 2528 cmd.exe 89 PID 2528 wrote to memory of 556 2528 cmd.exe 89 PID 2600 wrote to memory of 4724 2600 service.exe 93 PID 2600 wrote to memory of 4724 2600 service.exe 93 PID 2600 wrote to memory of 4724 2600 service.exe 93 PID 4724 wrote to memory of 2728 4724 cmd.exe 95 PID 4724 wrote to memory of 2728 4724 cmd.exe 95 PID 4724 wrote to memory of 2728 4724 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\piponis-main\riroiciend.exe"C:\Users\Admin\AppData\Local\Temp\piponis-main\riroiciend.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:556
-
-
-
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5753175a2a378c1448b5e6946d2421599
SHA11a856255b7868a050cebc02845e4af6acb3912ef
SHA2562a216550fb6ef956beb4029c2c18049a1c66cc271470a09c3b0b6103440e7280
SHA51207e2c0c976c288d3ed0ffe370f6b5538df2c89edc52a21f6025996135d8e4143341e8a0322f7acbb83b9a6c7bae7c88a492aa39c73c88b21bcce19404f133fb3