Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. HIUPAN

HIUPAN

HIUPAN (aka U2DiskWatch) is a is a worm that propagates through removable drives known to be leveraged byMustang Panda and was first observed utilized in 2024.[1][2]

ID: S1230
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 06 August 2025
Last Modified: 21 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

HIUPAN has added Registry Run keys to achieve persistence usingHKCU\Software\Microsoft\Windows\CurrentVersion\Run.[1][2]

EnterpriseT1678Delay Execution

HIUPAN has used a config file "$.ini" to store a sleep multiplier to execute at a set interval value prior to initiating a watcher function that checks for a specific running process, that checks for removable drives and installs itself and supporting files if one is available.[1][2]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

HIUPAN has modified registry keys to ensure hidden files and extensions are not visible through the modification ofHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced.[1][2]

EnterpriseT1574.001Hijack Execution Flow:DLL

HIUPAN has abused legitimate executables to side-load malicious DLLs to include the legitimate exe UsbConfig.exe.[1][2]

EnterpriseT1112Modify Registry

HIUPAN has modified registry keys to ensure hidden files and extensions are not visible through the modification ofHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced.[1][2]

EnterpriseT1120Peripheral Device Discovery

HIUPAN has checked periodically for removable drives and installs itself when a drive is detected.[1][2]

EnterpriseT1057Process Discovery

HIUPAN has conducted process discovery to identify thePUBLOAD malware under the process WCBrowserWatcher.exe and will launch it from an install directory if it is not found.[2]

EnterpriseT1091Replication Through Removable Media

HIUPAN has periodically checked for removable and hot-plugged drives connected to the infected machine, should one be foundHIUPAN will propagate to the removeable drives by copying itself and accompanying malware components to a directory to the new drive in a hidden subdirectory<Drive_Letter>:\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\ and hides any other existing files to ensure UsbConfig.exe is the only visible file on the device.[1][2]

EnterpriseT1204.002User Execution:Malicious File

HIUPAN has lured victims into executing malicious files from USBs including the use of files such as USBconfig.exe.[1][2]

Groups That Use This Software

IDNameReferences
G0129Mustang Panda

[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp