Overview
overview
10Static
static
72023.10.12.exe
windows7-x64
12023.10.12.exe
windows10-2004-x64
1HipsMain.exe
windows7-x64
7HipsMain.exe
windows10-2004-x64
7HipsMain1.exe
windows7-x64
7HipsMain1.exe
windows10-2004-x64
7[local]loader.exe
windows7-x64
7[local]loader.exe
windows10-2004-x64
7[sus]aaa.exe
windows7-x64
10[sus]aaa.exe
windows10-2004-x64
10logsave.exe
windows7-x64
7logsave.exe
windows10-2004-x64
7福建省�...��.exe
windows7-x64
7福建省�...��.exe
windows10-2004-x64
7说明书.exe
windows7-x64
1说明书.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27-10-2023 03:49
Behavioral task
behavioral1
Sample
2023.10.12.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2023.10.12.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
HipsMain.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
HipsMain.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
HipsMain1.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
HipsMain1.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
[local]loader.exe
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
[local]loader.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
[sus]aaa.exe
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
[sus]aaa.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
logsave.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
logsave.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
福建省福州市闽运集团有限公司约巴定制巴士企划书.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
福建省福州市闽运集团有限公司约巴定制巴士企划书.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral15
Sample
说明书.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
说明书.exe
Resource
win10v2004-20231023-en
General
-
Target
HipsMain.exe
-
Size
9.0MB
-
MD5
4eca89b96ba84a68348f85b3a9dc03b7
-
SHA1
a1fd3e9093d8153b15fc1102f35c745b375ce9dc
-
SHA256
8df72d49778de3cc2ba9c31299f7f4a0a0a144ea4826a51b1de75d037ba2a7f7
-
SHA512
6170c930d76c9aca6ee9a6b4816b829677c7b303a20afc62e38fe675c7acd1e1fb8dca756c4ed44106fa1f37a99e05ebd271f78b7edddf238a3a15effd78ec32
-
SSDEEP
196608:ohPrc50mr2puHUHNTqICteEroXx8axG6NIyzlu8pgUN0Mi8mENps:OcKmr2pu0tTqInEroXOakuIyzlu8pja4
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
HipsMain.exepid process 2720 HipsMain.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
HipsMain.exedescription pid process target process PID 2872 wrote to memory of 2720 2872 HipsMain.exe HipsMain.exe PID 2872 wrote to memory of 2720 2872 HipsMain.exe HipsMain.exe PID 2872 wrote to memory of 2720 2872 HipsMain.exe HipsMain.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI28722\python39.dllFilesize
4.3MB
MD50c74e7172e79148d2c995951cb828fa1
SHA16e46616de50a7871668b2e6a22895b9c594d232a
SHA2563937d1865f5a6f9ba892705bbe75352defc7b083b61894a4bdb6adefe0c2b39d
SHA512bbca4b2c6338f0d4274c5db371cae075834677844e457280d8d9f2c5ba74b3a9a159aeb978cf3fa4983d2efda62cbc2c9570d56e4a9682324f7fc7c2788ede86
-
\Users\Admin\AppData\Local\Temp\_MEI28722\python39.dllFilesize
4.3MB
MD50c74e7172e79148d2c995951cb828fa1
SHA16e46616de50a7871668b2e6a22895b9c594d232a
SHA2563937d1865f5a6f9ba892705bbe75352defc7b083b61894a4bdb6adefe0c2b39d
SHA512bbca4b2c6338f0d4274c5db371cae075834677844e457280d8d9f2c5ba74b3a9a159aeb978cf3fa4983d2efda62cbc2c9570d56e4a9682324f7fc7c2788ede86