Malware

What is “Win32/Kryptik.HIUX”?

Malware Removal

The Win32/Kryptik.HIUX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HIUX virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • A named pipe was used for inter-process communication
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Serbian
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Enumerates services, possibly for anti-virtualization
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • CAPE detected the Tofsee malware family
  • Detects Bochs through the presence of a registry key
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Kryptik.HIUX?


File Info:

name: 3F8CFBC5B955BCC86A08.mlw
path: /opt/CAPEv2/storage/binaries/35ba49abe776c348eb956896f107375eef2dfb149edce91ba6510e6470b98b04
crc32: A323366B
md5: 3f8cfbc5b955bcc86a0886d2dcca6d31
sha1: d6a5f60061900c2d2a4137ac145a9998ef4c3819
sha256: 35ba49abe776c348eb956896f107375eef2dfb149edce91ba6510e6470b98b04
sha512: 7c1201b0eabd212512e12105c01688d6d254e830849e7f39e58bb5da2c3db473bc3ca424f1d86689c9c6d404b02008af9bb339752c710029217a714d2c2f13a6
ssdeep: 6144:HT8GugLpjfl31DpESSRr71aWgeVOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOB:zuUf9xYrRMe7
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T179D60984E7C75944F0F44F316CA7DF6113B8FC10BE069B4BE648626E2EA4736A973225
sha3_384: 366e8acf649eac9fc6006ac7cd46fcd2e72a982d0952f3275d3452982939e76510b0897ba56afbdb04d3a282f523e249
ep_bytes: 60be00a0c2048dbe00707dfb57eb0b90
timestamp: 2019-10-22 22:17:42

Version Info:

FileVersion: 6.26.341
InternalName: triwilbifor.occ
Copyright: Copyrighz (C) 2020, wodkagudy
ProductVersion: 1.13.21
TranslationUsa: 0x0173 0x00e1

Win32/Kryptik.HIUX also known as:

Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Heur.Variadic.A.178.1
FireEyeGeneric.mg.3f8cfbc5b955bcc8
CAT-QuickHealTrojan.GenericRI.S18564550
McAfeeArtemis!3F8CFBC5B955
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34742.@pKfaKOBVbmG
CyrenW32/Kryptik.CXK.gen!Eldorado
ESET-NOD32a variant of Win32/Kryptik.HIUX
ClamAVWin.Packed.Gocloudnet-9821314-0
KasperskyHEUR:Trojan.Win32.Zenpak.gen
BitDefenderGen:Heur.Variadic.A.178.1
AvastWin32:BotX-gen [Trj]
Ad-AwareGen:Heur.Variadic.A.178.1
SophosML/PE-A + Mal/Agent-AWV
ZillyaBackdoor.Tofsee.Win32.4261
McAfee-GW-EditionBehavesLike.Win32.BadFile.rt
EmsisoftGen:Heur.Variadic.A.178.1 (B)
SentinelOneStatic AI – Malicious PE
JiangminBackdoor.Tofsee.dmw
AviraTR/Crypt.ULPM.Gen
MAXmalware (ai score=88)
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmHEUR:Trojan.Win32.Zenpak.gen
GDataGen:Heur.Variadic.A.178.1
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.MalPe.C4300730
Acronissuspicious
ALYacGen:Heur.Variadic.A.178.1
VBA32Backdoor.Tofsee
MalwarebytesTrojan.MalPack.GS
APEXMalicious
RisingTrojan.Kryptik!8.8 (TFE:dGZlOgXpDPNBh/C5fg)
IkarusTrojan-Downloader.Win32.Zurgop
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/UrSnif.C6C8!tr
AVGWin32:BotX-gen [Trj]
Cybereasonmalicious.5b955b

How to remove Win32/Kryptik.HIUX?

Win32/Kryptik.HIUX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment