General
-
Target
Hiphenatus.exe
-
Size
39KB
-
Sample
250415-yjyagazpx4
-
MD5
97fa7911629571961cbb88dcda8cf4fd
-
SHA1
06fd2d268f0f9f4dadccec56aeac3195f9d6c672
-
SHA256
daeaa7ef33eaae8a4cf6684a3974c0353e0dfe0f9faf6f6445c5243f67b49e89
-
SHA512
fb5450ad5e446e693771fac035cc5ea85ececa9b313bb2814fca7748738a0cfde078de14a37a6311cda76d1e063a55e1372d1009fdf977a230abfca062352bdf
-
SSDEEP
768:WgcpcUcQc9cbdcmcJN/7chXcGm4kn25CC9irYW3xyyrUbsLmh2JL6E2obx5Xc:WgcpcUcQc9cbdcmcJN/7chXc7yCC9892
Static task
static1
Behavioral task
behavioral1
Sample
Hiphenatus.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Hiphenatus.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
Hiphenatus.exe
-
Size
39KB
-
MD5
97fa7911629571961cbb88dcda8cf4fd
-
SHA1
06fd2d268f0f9f4dadccec56aeac3195f9d6c672
-
SHA256
daeaa7ef33eaae8a4cf6684a3974c0353e0dfe0f9faf6f6445c5243f67b49e89
-
SHA512
fb5450ad5e446e693771fac035cc5ea85ececa9b313bb2814fca7748738a0cfde078de14a37a6311cda76d1e063a55e1372d1009fdf977a230abfca062352bdf
-
SSDEEP
768:WgcpcUcQc9cbdcmcJN/7chXcGm4kn25CC9irYW3xyyrUbsLmh2JL6E2obx5Xc:WgcpcUcQc9cbdcmcJN/7chXc7yCC9892
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
4Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1