Overview
overview
10Static
static
10piponis-ma...jf.exe
windows10-ltsc 2021-x64
8piponis-ma...fr.exe
windows10-ltsc 2021-x64
8piponis-ma...we.exe
windows10-ltsc 2021-x64
8piponis-ma...ti.exe
windows10-ltsc 2021-x64
8piponis-ma...id.exe
windows10-ltsc 2021-x64
10piponis-ma...ke.exe
windows10-ltsc 2021-x64
10piponis-ma...js.exe
windows10-ltsc 2021-x64
10piponis-ma...rs.exe
windows10-ltsc 2021-x64
10piponis-ma...ub.exe
windows10-ltsc 2021-x64
10piponis-ma...id.exe
windows10-ltsc 2021-x64
10piponis-ma...rr.exe
windows10-ltsc 2021-x64
piponis-ma...ef.exe
windows10-ltsc 2021-x64
7piponis-ma...ja.exe
windows10-ltsc 2021-x64
8piponis-ma...gl.exe
windows10-ltsc 2021-x64
10piponis-ma...sa.exe
windows10-ltsc 2021-x64
8piponis-ma...th.exe
windows10-ltsc 2021-x64
8piponis-ma...as.exe
windows10-ltsc 2021-x64
8piponis-ma...uw.exe
windows10-ltsc 2021-x64
10piponis-ma...jg.exe
windows10-ltsc 2021-x64
1piponis-ma...jk.exe
windows10-ltsc 2021-x64
10piponis-ma...id.exe
windows10-ltsc 2021-x64
8piponis-ma...wf.exe
windows10-ltsc 2021-x64
8piponis-ma...nd.exe
windows10-ltsc 2021-x64
8Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/02/2025, 21:08
Behavioral task
behavioral1
Sample
piponis-main/bdorjfusiejf.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral2
Sample
piponis-main/bffgjingfr.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral3
Sample
piponis-main/bioldgefsawe.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
piponis-main/cjitigjfktti.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral5
Sample
piponis-main/cjrimgid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral6
Sample
piponis-main/dirificoskejcivke.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral7
Sample
piponis-main/girpwkfuejs.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral8
Sample
piponis-main/heifjejrs.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral9
Sample
piponis-main/horrxjddub.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral10
Sample
piponis-main/jrirkfiweid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral11
Sample
piponis-main/jtunuhhrr.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral12
Sample
piponis-main/ltohjksef.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral13
Sample
piponis-main/mkthooesfja.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral14
Sample
piponis-main/mmytljldrgl.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral15
Sample
piponis-main/mnyksdrfkesa.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral16
Sample
piponis-main/niyjkdrfseth.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral17
Sample
piponis-main/nohtysefhas.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral18
Sample
piponis-main/ogprjsirbfuw.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral19
Sample
piponis-main/oiuyjikdkjg.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral20
Sample
piponis-main/opyjjsefjk.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral21
Sample
piponis-main/plrifjidicfid.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral22
Sample
piponis-main/pyjhiksfasewf.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral23
Sample
piponis-main/riroiciend.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
piponis-main/girpwkfuejs.exe
-
Size
212KB
-
MD5
3bb795264a7175510c8c9ef53ababd30
-
SHA1
e940eac94bce50f020ffdfde60db22aff1af430d
-
SHA256
64d001c2df7421b40626778242c0e1d9b4da485ad2c6cf5a1bd15ef1efbc7b9d
-
SHA512
57afb6b3c0ba1eb76366b92de8407f980ef724ada908eaf2bc7b4c821d30986394f7962b180ad02fbe951d10f2a8ca2f8f544cda824d10cfabb307ee688b57ae
-
SSDEEP
3072:v78wc7PUb81Q/H+1HpO0III+tO/HapEMqZ:jW7PUbhewf+8/eEB
Malware Config
Extracted
xworm
193.233.113.143:7777
-
Install_directory
%AppData%
-
install_file
NVIDIA Web Helper.exe
-
telegram
https://api.telegram.org/bot7601194772:AAF0YEs0H7jvhy6INvzsb36sFxrYz96gaLY/sendMessage?chat_id=1919987045
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral7/memory/3320-1-0x0000000000BD0000-0x0000000000C0A000-memory.dmp family_xworm -
Xworm family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 19 648 Process not Found -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 472 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3320 girpwkfuejs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\piponis-main\girpwkfuejs.exe"C:\Users\Admin\AppData\Local\Temp\piponis-main\girpwkfuejs.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDQ1NjQzODEtMzBGRS00NkNBLTgwMjAtQkE1OTY0QzFBMDA2fSIgdXNlcmlkPSJ7RkJEQjMwMEQtRjlDOS00QUJCLUE5NUEtMkRGN0MyQzk4QjYzfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NDNBMzhDRDItRTE2RC00Rjk4LTgxOTktRTA5Njc4MzZFRTdGfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0NC40NTI5IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iMTI1IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:472